# [Completed] Professional Google Cybersecurity Specialization C3/8; Connect and Protect: Networks and Network Security

14 hours (approximately)  
Grade Achieved: 97.62% pro tip only do the exams when your not tired

# getting started & introduction to networks

# Introduction to Course 3 + course 3 overview

#### Introduction

  
You've learned about security domains in previous courses.  
Now we'll explore one of those domains further: networks.  
It's important to secure networks because network-based attacks are growing in both  
frequency and complexity.

  
Hi there! My name is Chris, and I'm the Chief Information Security Officer for  
Google Fiber.  
I'm excited to be your instructor for this course!  
I've been working in network security and engineering for over 20 years, and  
I'm looking forward to sharing some of my knowledge and experience with you.

  
This course will help you understand the basic structure of a network (also  
referred to as network architecture) and commonly used network tools.  
You'll also learn about network operations and explore some basic network protocols.  
Next, you'll learn about common network attacks and  
how network intrusion tactics can prevent a threat to a network.  
Finally, the course will provide an overview of security hardening practices  
and how you might use them to help secure a network.

  
There's a lot to learn in securing networks, and  
I'm excited to go on this journey with you.  
Ready to get started?  
Let's go!

# Course 3 overview

<div class="rc-CML" dir="auto" id="bkmrk-"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Course 3 welcome banner](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/BtjICPOGTXWUJIBCqAKAVw_531d36f3060f4b81967b6028e199b4f1_x-cert-image_Welcome-banner-C3.png?expiry=1687824000000&hmac=j8srplz52zK7YSmguHbtXqIJUM-prPYuGJHukczEysA)</figure></div></div></div></div></div></div></div>Hello and welcome to **Connect and Protect: Networks and Network Security**, the third course in the Google Cybersecurity Certificate. You’re on an exciting journey!

By the end of this course, you will develop a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. You’ll also be introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.

## Certificate program progress

The Google Cybersecurity Certificate program has eight courses. **Connect and Protect: Networks and Network Security** is the third course.

<div class="rc-CML" dir="auto" id="bkmrk-foundations-of-cyber"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![The titles of each of the eight courses with course three highlighted](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/LfkwAA0MSw-Jvap-uJZHXw_cd688a56c2b744028aad1706c44a7af1_S33G005.png?expiry=1687824000000&hmac=yw-ediaOIY_3PISadEEMJqOG_UOHLA5rMxOk9h8eCI0)</figure></div>1. [**Foundations of Cybersecurity**<svg aria-labelledby="cds-react-aria-321-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/foundations-of-cybersecurity/home/week/1)

</div></div></div></div></div>- — Explore the cybersecurity profession, including significant events that led to the development of the cybersecurity field and its continued importance to organizational operations. Learn about entry-level cybersecurity roles and responsibilities.
- [**Play It Safe: Manage Security Risks**<svg aria-labelledby="cds-react-aria-322-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/manage-security-risks/home/week/1)
- — Identify how cybersecurity professionals use frameworks and controls to protect business operations, and explore common cybersecurity tools.
- [**Connect and Protect: Networks and Network Security**<svg aria-labelledby="cds-react-aria-323-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/home/week/1)
- — *(current course)* Gain an understanding of network-level vulnerabilities and how to secure networks.
- [**Tools of the Trade: Linux and SQL**<svg aria-labelledby="cds-react-aria-324-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/linux-and-sql/home/week/1)
- — Explore foundational computing skills, including communicating with the Linux operating system through the command line and querying databases with SQL.
- [**Assets, Threats, and Vulnerabilities**<svg aria-labelledby="cds-react-aria-325-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/assets-threats-and-vulnerabilities/home/week/1)
- — Learn about the importance of security controls and developing a threat actor mindset to protect and defend an organization’s assets from various threats, risks, and vulnerabilities.
- [**Sound the Alarm: Detection and Response**<svg aria-labelledby="cds-react-aria-326-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--6" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/detection-and-response/home/week/1)
- — Understand the incident response lifecycle and practice using tools to detect and respond to cybersecurity incidents.
- [**Automate Cybersecurity Tasks with Python**<svg aria-labelledby="cds-react-aria-327-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--7" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/home/week/1)
- — Explore the Python programming language and write code to automate cybersecurity tasks.
- [**Put It to Work: Prepare for Cybersecurity Jobs**<svg aria-labelledby="cds-react-aria-328-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--8" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/prepare-for-cybersecurity-jobs/home/week/1)

1. — Learn about incident classification, escalation, and ways to communicate with stakeholders. This course closes out the program with tips on how to engage with the cybersecurity community and prepare for your job search.

## Course 3 content

Each course of this certificate program is broken into weeks. You can complete courses at your own pace, but the weekly breakdowns are designed to help you finish the entire Google Cybersecurity Certificate in about six months.

What’s to come? Here’s a quick overview of the skills you’ll learn in each week of this course.

### **Week 1: Network architecture**

<div id="bkmrk--9"><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 1 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/36GLUQr7Rz60ZRwJNJObZw_b989febb4ac04369ba9c241ed72881f1_Connect-R-163-1.png?expiry=1687824000000&hmac=neu3qLkz7HR_d3I4-oJ71TEI3lG5W3b0oZqgo8JDT_8)</figure></div>You'll be introduced to network security and explain how it relates to ongoing security threats and vulnerabilities. You will learn about network architecture and mechanisms to secure a network.

### **Week 2: Network operations** 

<div id="bkmrk--10"><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 2 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/ORBMWcTqRsGvDsoNVocdVQ_a49f2f2a813b444b922af0da194a6ef1_Connect-R-163-2.png?expiry=1687824000000&hmac=O__cKZLQe73XFELegLTaqf1mKWoWBS9QGRhiUc35-zE)</figure></div>You will explore network protocols and how network communication can introduce vulnerabilities. In addition, you'll learn about common security measures, like firewalls, that help network operations remain safe and reliable.

### **Week 3: Secure against network intrusions**

<div id="bkmrk--11"><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 3 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/5lVh3ajMTFqGA0jf1IpL5A_d3b805ef5dd54ae0a6f15574ac19f7f1_Connect-R-163-3.png?expiry=1687824000000&hmac=CO_KBJ4ibVMSovwusREdDVIKpmli2Q-ni69LGU9OGBc)</figure></div>You will understand types of network attacks and techniques used to secure compromised network systems and devices. You'll explore the many ways that malicious actors exploit vulnerabilities in network infrastructure and how cybersecurity professionals identify and close potential loopholes.

### **Week 4: Security hardening**

<div id="bkmrk--12"><figure contenteditable="false" role="figure">![Five icons show the course followed by the four weeks sequentially from left to right with week 4 highlighted.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/vt9Dt50XSCuFn5KKehBJsQ_aa7bb3f467434fad8967662f30b6b2f1_Connect-R-163-4.png?expiry=1687824000000&hmac=7ejYsJTtZlhQjSFWycAnGuWXL1t_iVsfKTN1KBYxyLE)</figure></div>You will become familiar with network hardening practices that strengthen network systems. You'll learn how security hardening helps defend against malicious actors and intrusion methods. You'll also learn how to use security hardening to address the unique security challenges posed by cloud infrastructures.

## What to expect

Each course offers many types of learning opportunities:

- **Videos** led by Google instructors teach new concepts, introduce the use of relevant tools, offer career support, and provide inspirational personal stories.
- **Readings** build on the topics discussed in the videos, introduce related concepts, share useful resources, and describe case studies.
- **Discussion prompts** explore course topics for better understanding and allow you to chat and exchange ideas with other learners in the [**discussion forums**<svg aria-labelledby="cds-react-aria-329-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--13" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/discussions)

- .
- **Self-review activities** and **labs** give you hands-on practice in applying the skills you are learning and allow you to assess your own work by comparing it to a completed example.
- **Interactive plug-ins** encourage you to practice specific tasks and help you integrate knowledge you have gained in the course.
- **In-video quizzes** help you check your comprehension as you progress through each video.
- **Practice quizzes** allow you to check your understanding of key concepts and provide valuable feedback.
- **Graded quizzes** demonstrate your understanding of the main concepts of a course. You must score 80% or higher on each graded quiz to obtain a certificate, and you can take a graded quiz multiple times to achieve a passing score.

## Tips for success

- It is strongly recommended that you go through the items in each lesson in the order they appear because new information and concepts build on previous knowledge.
- Participate in all learning opportunities to gain as much knowledge and experience as possible.
- If something is confusing, don’t hesitate to replay a video, review a reading, or repeat a self-review activity.
- Use the additional resources that are referenced in this course. They are designed to support your learning. You can find all of these resources in the [**Resources**<svg aria-labelledby="cds-react-aria-330-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--14" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/resources/Cd90m)
- tab.
- When you encounter useful links in this course, bookmark them so you can refer to the information later for study or review.
- Understand and follow the[ Coursera Code of Conduct<svg aria-labelledby="cds-react-aria-331-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--15" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/208280036-Coursera-Code-of-Conduct)

- to ensure that the learning community remains a welcoming, friendly, and supportive place for all members.
    
    # Helpful resources and tips
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">As a learner, you can choose to complete one or multiple courses in this program. However, to obtain the Google Cybersecurity Certificate, you must complete all the courses. This reading describes what is required to obtain a certificate and best practices for you to have a good learning experience on Coursera.</span>
    
    ## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Course completion to obtain a certificate</span>
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To submit graded assignments and be eligible to receive a Google Cybersecurity Certificate, you must:</span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Pay the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[course certificate fee<svg aria-labelledby="cds-react-aria-243-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--16" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209818963-Payments-on-Coursera?language=en_US)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> or apply and be approved for a Coursera </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[scholarship<svg aria-labelledby="cds-react-aria-244-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--17" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209819033-Apply-for-Financial-Aid-or-a-Scholarship?language=en_US)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Pass all graded quizzes in the eight courses with a score of at least 80%. Each graded quiz in a course is part of a cumulative grade for that course. </span>
    
    </div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Healthy habits for course completion</span>
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Here is a list of best practices that will help you complete the courses in the program in a timely manner: </span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Plan your time:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Setting regular study times and following them each week can help you make learning a part of your routine. Use a calendar or timetable to create a schedule, and list what you plan to do each day in order to set achievable goals. Find a space that allows you to focus when you watch the videos, review the readings, and complete the activities.</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Work at your own pace:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Everyone learns differently, so this program has been designed to let you work at your own pace. Although your personalized deadlines start when you enroll, feel free to move through the program at the speed that works best for you. There is no penalty for late assignments; to earn your certificate, all you have to do is complete all of the work. You can extend your deadlines at any time by going to</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> **Overview**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> in the navigation panel and selecting </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Switch Sessions**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. If you have already missed previous deadlines, select </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Reset my deadlines**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> instead.</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Be curious:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> If you find an idea that gets you excited, act on it! Ask questions, search for more details online, explore the links that interest you, and take notes on your discoveries. The steps you take to support your learning along the way will advance your knowledge, create more opportunities in this high-growth field, and help you qualify for jobs. </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Take notes:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Notes will help you remember important information in the future, especially as you’re preparing to enter a new job field. In addition, taking notes is an effective way to make connections between topics and gain a better understanding of those topics.</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Review exemplars:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Exemplars are completed assignments that fully meet an activity's criteria. Many activities in this program have exemplars for you to validate your work or check for errors. Although there are often many ways to complete an assignment, exemplars offer guidance and inspiration about how to complete the activity. </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Chat (responsibly) with other learners:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you have a question, chances are, you’re not alone. Use the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[discussion forums<svg aria-labelledby="cds-react-aria-245-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--18" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/discussions)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> to ask for help from other learners taking this program. You can also visit Coursera’s </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Global Online Community<svg aria-labelledby="cds-react-aria-246-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--19" role="img" viewbox="0 0 16 16" width="16"></svg>](https://coursera.community/)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. Other important things to know while learning with others can be found in the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Coursera Honor Code<svg aria-labelledby="cds-react-aria-247-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--20" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us/articles/209818863-Coursera-Honor-Code)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> and </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Code of Conduct<svg aria-labelledby="cds-react-aria-248-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--21" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us/articles/208280036-Coursera-Code-of-Conduct)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">. </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Update your profile:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Consider </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[updating your profile<svg aria-labelledby="cds-react-aria-249-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--22" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/account/profile)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> on Coursera. When other learners find you in the discussion forums, they can click on your name to access your profile and get to know you better.</span>
    
    </div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Documents, spreadsheets, presentations, and labs for course activities</span>
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To complete certain activities in the program, you will need to use digital documents, spreadsheets, presentations, and/or labs. Security professionals use these software tools to collaborate within their teams and organizations. If you need more information about using a particular tool, refer to these resources:</span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Microsoft Word: Help and learning<svg aria-labelledby="cds-react-aria-250-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--23" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/word)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Microsoft Support page for Word</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Google Docs<svg aria-labelledby="cds-react-aria-251-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--24" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9046002?hl=en&ref_topic=1382883)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Help Center page for Google Docs</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Microsoft Excel: Help and learning<svg aria-labelledby="cds-react-aria-252-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--25" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/excel)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Microsoft Support page for Excel</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Google Sheets<svg aria-labelledby="cds-react-aria-253-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--26" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9054603?hl=en&ref_topic=1382883)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Help Center page for Google Sheets</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Microsoft PowerPoint: Help and learning<svg aria-labelledby="cds-react-aria-254-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--27" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/powerpoint)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Microsoft Support page for PowerPoint</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[How to use Google Slides<svg aria-labelledby="cds-react-aria-255-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--28" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/answer/2763168?hl=en&co=GENIE.Platform%3DDesktop)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Help Center page for Google Slides </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Common problems with labs<svg aria-labelledby="cds-react-aria-256-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--29" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/qwiklabs/answer/9133560?hl=en&ref_topic=9134804)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: Troubleshooting help for Qwiklabs activities</span>
    
    </div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Weekly, course, and certificate glossaries</span>
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">This program covers a lot of terms and concepts, some of which you may already know and some of which may be unfamiliar to you. To review terms and help you prepare for graded quizzes, refer to the following glossaries:</span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Weekly glossaries**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: At the end of each week’s content, you can review a glossary of terms from that week. Each week’s glossary builds upon the terms from the previous weeks in that course. The weekly glossaries are not downloadable; however, all of the terms and definitions are included in the course and certificate glossaries, which are downloadable.</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Course glossaries**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: At the end of each course, you can access and download a glossary that covers all of the terms in that course. </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Certificate glossary**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">: The certificate glossary includes all of the terms in the entire certificate program and is a helpful resource that you can reference throughout the program or at any time in the future. </span>
    
    </div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">You can access and download the certificate glossaries and save them on your computer. You can always find the course and certificate glossaries through the course’s </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Resources<svg aria-labelledby="cds-react-aria-257-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--30" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/lFqNR/course-3-glossary "Link to the course 3 resources section")</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> section. To access the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cybersecurity Certificate glossary**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">, click the link below and select </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">*Use Template*</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Cybersecurity Certificate glossary<svg aria-labelledby="cds-react-aria-258-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--31" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/1Feb8pHRY-blnpaLOohds2esd6IWdCIp-ikG7G_omSj4/template/preview?usp=sharing&resourcekey=0-YHcAISkCiqGDq5KwO6yNeQ)</span>
    
    </div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">OR</span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you don’t have a Google account, you can download the glossary directly from the attachment below.</span>
    
    <div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div contenteditable="false" data-e2e="slate-asset-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<div class="asset-wrapper css-cp6qd0" data-testid="asset-v2-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; outline: none; user-select: none;"><div class="cml-asset cml-asset-generic cml-nonmedia-asset css-1pyc1gq" data-e2e="cml-asset cml-asset-generic cml-nonmedia-asset" data-extension="docx" data-id="Q__8HGJKSWKvlbOKLdTtkg" data-name="Google Cybersecurity Certificate glossary" data-url="https://d3c33hcgiwev3.cloudfront.net/Q__8HGJKSWKvlbOKLdTtkg_ad50d57e3f79455783a12f606c297af1_Google-Cybersecurity-Certificate-glossary.docx?Expires=1687996800&Signature=CLzSnDw9uQiv6oNhNJm1goAMEwo6Q3GSqdWznZPUqdIQLHRF5r0Nb4mtfda6iQdjrkhtxfxpiKffgLCUILwGbxw5IGJfp7wVCOarzH5S1nN85mLBCA1KBagJspF5VNlL6WBTe3GNUaEONcHFRUwWBk8q1dMftXOz~zoZMQR9-sg_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: var(--cds-color-grey-100); border-radius: 8px; height: 84px; padding: 0px var(--cds-spacing-300); display: flex; -webkit-box-align: center; align-items: center; width: 786.275px; margin-bottom: var(--cds-spacing-150);"><div data-e2e="asset-icon" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><svg aria-labelledby="cds-react-aria-259-title" class="css-0" fill="none" focusable="false" height="24" id="bkmrk--32" role="img" viewbox="0 0 24 24" width="24"></svg></div><div class="css-1p5m8jc" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; flex: 1 1 0%; min-width: 0px; flex-direction: column; white-space: nowrap; overflow-x: hidden; margin-left: var(--cds-spacing-200);"><div class="css-1kdxvh1" data-e2e="asset-name" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-size: var(--cds-font-size-title3); line-height: var(--cds-line-height-title3); font-family: var(--cds-font-family-source-sans-pro); font-weight: var(--cds-font-weight-700); letter-spacing: var(--cds-letter-spacing-125); text-overflow: ellipsis; overflow: hidden;">Google Cybersecurity Certificate glossary</div><div class="css-1ihft8k" data-e2e="asset-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; letter-spacing: 0px; font-size: var(--cds-font-size-body1); line-height: var(--cds-line-height-body1); font-family: var(--cds-font-family-source-sans-pro); font-weight: var(--cds-font-weight-400); color: var(--cds-color-grey-700); margin-top: var(--cds-spacing-50);">DOCX File</div></div></div></div>](https://d3c33hcgiwev3.cloudfront.net/Q__8HGJKSWKvlbOKLdTtkg_ad50d57e3f79455783a12f606c297af1_Google-Cybersecurity-Certificate-glossary.docx?Expires=1687996800&Signature=CLzSnDw9uQiv6oNhNJm1goAMEwo6Q3GSqdWznZPUqdIQLHRF5r0Nb4mtfda6iQdjrkhtxfxpiKffgLCUILwGbxw5IGJfp7wVCOarzH5S1nN85mLBCA1KBagJspF5VNlL6WBTe3GNUaEONcHFRUwWBk8q1dMftXOz~zoZMQR9-sg_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)</div></div></div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Course feedback</span>
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Providing feedback on videos, readings, and other materials is easy. With the resource open in your browser, you can find the thumbs-up and thumbs-down symbols. </span>
    
    <div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;">
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Click </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**thumbs-up**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> for materials that are helpful. </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Click </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**thumbs-down**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> for materials that are not helpful.</span>
    
    </div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you want to flag a specific issue with an item, click the flag icon, select a category, and enter an explanation in the text box. This feedback goes back to the course development team and isn’t visible to other learners. All feedback received helps to create even better certificate programs in the future. </span>
    
    <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">For technical help, visit the </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Learner Help Center<svg aria-labelledby="cds-react-aria-260-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--33" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

# New Page



# Glossary Cybersecurity

Terms and definitions from the certificate  
A  
Absolute file path: The full file path, which starts from the root  
Access controls: Security controls that manage access, authorization, and  
accountability of information  
Active packet sniffing: A type of attack where data packets are manipulated in transit  
Address Resolution Protocol (ARP): A network protocol used to determine the MAC  
address of the next router or device on the path  
Advanced persistent threat (APT): An instance when a threat actor maintains  
unauthorized access to a system for an extended period of time  
Adversarial artificial intelligence (AI): A technique that manipulates artificial  
intelligence (AI) and machine learning (ML) technology to conduct attacks more  
efficiently  
Adware: A type of legitimate software that is sometimes used to display digital  
advertisements in applications  
Algorithm: A set of rules used to solve a problem  
Analysis: The investigation and validation of alerts  
Angler phishing: A technique where attackers impersonate customer service  
representatives on social media  
Anomaly-based analysis: A detection method that identifies abnormal behavior

Antivirus software: A software program used to prevent, detect, and eliminate  
malware and viruses  
Application: A program that performs a specific task  
Application programming interface (API) token: A small block of encrypted code  
that contains information about a user  
Argument (Linux): Specific information needed by a command  
Argument (Python): The data brought into a function when it is called  
Array: A data type that stores data in a comma-separated ordered list  
Assess: The fifth step of the NIST RMF that means to determine if established controls  
are implemented correctly  
Asset: An item perceived as having value to an organization  
Asset classification: The practice of labeling assets based on sensitivity and  
importance to an organization  
Asset inventory: A catalog of assets that need to be protected  
Asset management: The process of tracking assets and the risks that affect them  
Asymmetric encryption: The use of a public and private key pair for encryption and  
decryption of data  
Attack surface: All the potential vulnerabilities that a threat actor could exploit  
Attack tree: A diagram that maps threats to assets  
Attack vectors: The pathways attackers use to penetrate security defenses  
Authentication: The process of verifying who someone is  
Authorization: The concept of granting access to specific resources in a system  
Authorize: The sixth step of the NIST RMF that refers to being accountable for the  
security and privacy risks that might exist in an organization  
Automation: The use of technology to reduce human and manual effort to perform  
common and repetitive tasks  
Availability: The idea that data is accessible to those who are authorized to access it

B  
Baiting: A social engineering tactic that tempts people into compromising their  
security  
Bandwidth: The maximum data transmission capacity over a network, measured by  
bits per second  
Baseline configuration (baseline image): A documented set of specifications within  
a system that is used as a basis for future builds, releases, and updates  
Bash: The default shell in most Linux distributions  
Basic auth: The technology used to establish a user’s request to access a server  
Basic Input/Output System (BIOS): A microchip that contains loading instructions for  
the computer and is prevalent in older systems  
Biometrics: The unique physical characteristics that can be used to verify a person’s  
identity  
Bit: The smallest unit of data measurement on a computer  
Boolean data: Data that can only be one of two values: either True or False  
Bootloader: A software program that boots the operating system  
Botnet: A collection of computers infected by malware that are under the control of a  
single threat actor, known as the “bot-herder"  
Bracket notation: The indices placed in square brackets  
Broken chain of custody: Inconsistencies in the collection and logging of evidence in  
the chain of custody  
Brute force attack: The trial and error process of discovering private information  
Bug bounty: Programs that encourage freelance hackers to find and report  
vulnerabilities  
Built-in function: A function that exists within Python and can be called directly

Business continuity: An organization's ability to maintain their everyday productivity  
by establishing risk disaster recovery plans  
Business continuity plan (BCP): A document that outlines the procedures to sustain  
business operations during and after a significant disruption  
Business Email Compromise (BEC): A type of phishing attack where a threat actor  
impersonates a known source to obtain financial advantage  
C  
Categorize: The second step of the NIST RMF that is used to develop risk  
management processes and tasks  
CentOS: An open-source distribution that is closely related to Red Hat  
Central Processing Unit (CPU): A computer’s main processor, which is used to  
perform general computing tasks on a computer  
Chain of custody: The process of documenting evidence possession and control  
during an incident lifecycle  
Chronicle: A cloud-native tool designed to retain, analyze, and search data  
Cipher: An algorithm that encrypts information  
Cloud-based firewalls: Software firewalls that are hosted by the cloud service  
provider  
Cloud computing: The practice of using remote servers, applications, and network  
services that are hosted on the internet instead of on local physical devices  
Cloud network: A collection of servers or computers that stores resources and data in  
remote data centers that can be accessed via the internet  
Cloud security: The process of ensuring that assets stored in the cloud are properly  
configured and access to those assets is limited to authorized users  
Command: An instruction telling the computer to do something  
Command and control (C2): The techniques used by malicious actors to maintain  
communications with compromised systems

Command-line interface (CLI): A text-based user interface that uses commands to  
interact with the computer  
Comment: A note programmers make about the intention behind their code  
Common Event Format (CEF): A log format that uses key-value pairs to structure  
data and identify fields and their corresponding values  
Common Vulnerabilities and Exposures (CVE®) list: An openly accessible dictionary  
of known vulnerabilities and exposures  
Common Vulnerability Scoring System (CVSS): A measurement system that scores  
the severity of a vulnerability  
Compliance: The process of adhering to internal standards and external regulations  
Computer security incident response teams (CSIRT): A specialized group of  
security professionals that are trained in incident management and response  
Computer virus: Malicious code written to interfere with computer operations and  
cause damage to data and software  
Conditional statement: A statement that evaluates code to determine if it meets a  
specified set of conditions  
Confidentiality: The idea that only authorized users can access specific assets or data  
Confidential data: Data that often has limits on the number of people who have  
access to it  
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how  
organizations consider risk when setting up systems and security policies  
Configuration file: A file used to configure the settings of an application  
Containment: The act of limiting and preventing additional damage caused by an  
incident  
Controlled zone: A subnet that protects the internal network from the uncontrolled  
zone  
Cross-site scripting (XSS): An injection attack that inserts code into a vulnerable  
website or web application

Crowdsourcing: The practice of gathering information using public input and  
collaboration  
Cryptographic attack: An attack that affects secure forms of communication  
between a sender and intended recipient  
Cryptographic key: A mechanism that decrypts ciphertext  
Cryptography: The process of transforming information into a form that unintended  
readers can’t understand  
Cryptojacking: A form of malware that installs software to illegally mine  
cryptocurrencies  
CVE Numbering Authority (CNA): An organization that volunteers to analyze and  
distribute information on eligible CVEs  
Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and  
availability of information by protecting networks, devices, people, and data from  
unauthorized access or criminal exploitation  
D  
Data: Information that is translated, processed, or stored by a computer  
Data at rest: Data not currently being accessed  
Database: An organized collection of information or data  
Data controller: A person that determines the procedure and purpose for processing  
data  
Data custodian: Anyone or anything that’s responsible for the safe handling,  
transport, and storage of information  
Data exfiltration: Unauthorized transmission of data from a system  
Data in transit: Data traveling from one point to another  
Data in use: Data being accessed by one or more users  
Data owner: The person who decides who can access, edit, use, or destroy their  
information

Data packet: A basic unit of information that travels from one device to another within  
a network  
Data point: A specific piece of information  
Data processor: A person that is responsible for processing data on behalf of the data  
controller  
Data protection officer (DPO): An individual that is responsible for monitoring the  
compliance of an organization's data protection procedures  
Data type: A category for a particular type of data item  
Date and time data: Data representing a date and/or time  
Debugger: A software tool that helps to locate the source of an error and assess its  
causes  
Debugging: The practice of identifying and fixing errors in code  
Defense in depth: A layered approach to vulnerability management that reduces risk  
Denial of service (DoS) attack: An attack that targets a network or server and floods  
it with network traffic  
Detect: A NIST core function related to identifying potential security incidents and  
improving monitoring capabilities to increase the speed and efficiency of detections  
Detection: The prompt discovery of security events  
Dictionary data: Data that consists of one or more key-value pairs  
Digital certificate: A file that verifies the identity of a public key holder  
Digital forensics: The practice of collecting and analyzing data to determine what has  
happened after an attack  
Directory: A file that organizes where other files are stored  
Disaster recovery plan: A plan that allows an organization’s security team to outline  
the steps needed to minimize the impact of a security incident

Distributed denial of service (DDoS) attack: A type of denial or service attack that  
uses multiple devices or servers located in different locations to flood the target  
network with unwanted traffic  
Distributions: The different versions of Linux  
Documentation: Any form of recorded content that is used for a specific purpose  
DOM-based XSS attack: An instance when malicious script exists in the webpage a  
browser loads  
Domain Name System (DNS): A networking protocol that translates internet domain  
names into IP addresses  
Dropper: A type of malware that comes packed with malicious code which is delivered  
and installed onto a target system  
E  
Elevator pitch: A brief summary of your experience, skills, and background  
Encapsulation: A process performed by a VPN service that protects your data by  
wrapping sensitive data in other data packets  
Encryption: The process of converting data from a readable format to an encoded  
format  
Endpoint: Any device connected on a network  
Endpoint detection and response (EDR): An application that monitors an endpoint  
for malicious activity  
Eradication: The complete removal of the incident elements from all affected systems  
Escalation policy: A set of actions that outline who should be notified when an  
incident alert occurs and how that incident should be handled  
Event: An observable occurrence on a network, system, or device  
Exception: An error that involves code that cannot be executed even though it is  
syntactically correct  
Exclusive operator: An operator that does not include the value of comparison

Exploit: A way of taking advantage of a vulnerability  
Exposure: A mistake that can be exploited by a threat  
External threat: Anything outside the organization that has the potential to harm  
organizational assets  
F  
False negative: A state where the presence of a threat is not detected  
False positive: An alert that incorrectly detects the presence of a threat  
Fileless malware: Malware that does not need to be installed by the user because it  
uses legitimate programs that are already installed to infect a computer  
File path: The location of a file or directory  
Filesystem Hierarchy Standard (FHS): The component of the Linux OS that organizes  
data  
Filtering: Selecting data that match a certain condition  
Final report: Documentation that provides a comprehensive review of an incident  
Firewall: A network security device that monitors traffic to or from a network  
Float data: Data consisting of a number with a decimal point  
Foreign key: A column in a table that is a primary key in another table  
Forward proxy server: A server that regulates and restricts a person’s access to the  
internet  
Function: A section of code that can be reused in a program  
G  
Global variable: A variable that is available through the entire program  
Graphical user interface (GUI): A user interface that uses icons on the screen to  
manage different tasks on the computer

H  
Hacker: Any person who uses computers to gain access to computer systems,  
networks, or data  
Hacktivist: A person who uses hacking to achieve a political goal  
Hard drive: A hardware component used for long-term memory  
Hardware: The physical components of a computer  
Hash collision: An instance when different inputs produce the same hash value  
Hash function: An algorithm that produces a code that can’t be decrypted  
Hash table: A data structure that's used to store and reference hash values  
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law  
established to protect patients’ health information  
Honeypot: A system or resource created as a decoy vulnerable to attacks with the  
purpose of attracting potential intruders  
Host-based intrusion detection system (HIDS): An application that monitors the  
activity of the host on which it’s installed  
Hub: A network device that broadcasts information to every device on the network  
Hypertext Transfer Protocol (HTTP): An application layer protocol that provides a  
method of communication between clients and website servers  
Hypertext Transfer Protocol Secure (HTTPS): A network protocol that provides a  
secure method of communication between clients and website servers  
I  
Identify: A NIST core function related to management of cybersecurity risk and its  
effect on an organization’s people and assets  
Identity and access management (IAM): A collection of processes and technologies  
that helps organizations manage digital identities in their environment  
IEEE 802.11 (Wi-Fi): A set of standards that define communication for wireless LANs

Immutable: An object that cannot be changed after it is created and assigned a value  
Implement: The fourth step of the NIST RMF that means to implement security and  
privacy plans for an organization  
Improper usage: An incident type that occurs when an employee of an organization  
violates the organization’s acceptable use policies  
Incident: An occurrence that actually or imminently jeopardizes, without lawful  
authority, the confidentiality, integrity, or availability of information or an information  
system; or constitutes a violation or imminent threat of violation of law, security  
policies, security procedures, or acceptable use policies  
Incident escalation: The process of identifying a potential security incident, triaging it,  
and handing it off to a more experienced team member  
Incident handler’s journal: A form of documentation used in incident response  
Incident response: An organization’s quick attempt to identify an attack, contain the  
damage, and correct the effects of a security breach  
Incident response plan: A document that outlines the procedures to take in each step  
of incident response  
Inclusive operator: An operator that includes the value of comparison  
Indentation: Space added at the beginning of a line of code  
Index: A number assigned to every element in a sequence that indicates its position  
Indicators of attack (IoA): The series of observed events that indicate a real-time  
incident  
Indicators of compromise (IoC): Observable evidence that suggests signs of a  
potential security incident  
Information privacy: The protection of unauthorized access and distribution of data  
Information security (InfoSec): The practice of keeping data in all states away from  
unauthorized users  
Injection attack: Malicious code inserted into a vulnerable application  
Input validation: Programming that validates inputs from users and other programs

Integer data: Data consisting of a number that does not include a decimal point  
Integrated development environment (IDE): A software application for writing code  
that provides editing assistance and error correction tools  
Integrity: The idea that the data is correct, authentic, and reliable  
Internal hardware: The components required to run the computer  
Internal threat: A current or former employee, external vendor, or trusted partner who  
poses a security risk  
Internet Control Message Protocol (ICMP): An internet protocol used by devices to  
tell each other about data transmission errors across the network  
Internet Control Message Protocol flood (ICMP flood): A type of DoS attack  
performed by an attacker repeatedly sending ICMP request packets to a network  
server  
Internet Protocol (IP): A set of standards used for routing and addressing data  
packets as they travel between devices on a network  
Internet Protocol (IP) address: A unique string of characters that identifies the  
location of a device on the internet  
Interpreter: A computer program that translates Python code into runnable  
instructions line by line  
Intrusion detection system (IDS): An application that monitors system activity and  
alerts on possible intrusions  
Intrusion prevention system (IPS): An application that monitors system activity for  
intrusive activity and takes action to stop the activity  
IP spoofing: A network attack performed when an attacker changes the source IP of a  
data packet to impersonate an authorized system and gain access to a network  
Iterative statement: Code that repeatedly executes a set of instructions  
K

KALI LINUX TM: An open-source distribution of Linux that is widely used in the security  
industry  
Kernel: The component of the Linux OS that manages processes and memory  
Key-value pair: A set of data that represents two linked items: a key, and its  
corresponding value  
L  
Legacy operating system: An operating system that is outdated but still being used  
Lessons learned meeting: A meeting that includes all involved parties after a major  
incident  
Library: A collection of modules that provide code users can access in their programs  
Linux: An open-source operating system  
List concatenation: The concept of combining two lists into one by placing the  
elements of the second list directly after the elements of the first list  
List data: Data structure that consists of a collection of data in sequential form  
Loader: A type of malware that downloads strains of malicious code from an external  
source and installs them onto a target system  
Local Area Network (LAN): A network that spans small areas like an office building, a  
school, or a home  
Local variable: A variable assigned within a function  
Log: A record of events that occur within an organization’s systems  
Log analysis: The process of examining logs to identify events of interest  
Logging: The recording of events occurring on computer systems and networks  
Logic error: An error that results when the logic used in code produces unintended  
results  
Log management: The process of collecting, storing, analyzing, and disposing of log  
data

Loop condition: The part of a loop that determines when the loop terminates  
Loop variable: A variable that is used to control the iterations of a loop  
M  
Malware: Software designed to harm devices or networks  
Malware infection: An incident type that occurs when malicious software designed to  
disrupt a system infiltrates an organization’s computers or network  
Media Access Control (MAC) address: A unique alphanumeric identifier that is  
assigned to each physical device on a network  
Method: A function that belongs to a specific data type  
Metrics: Key technical attributes such as response time, availability, and failure rate,  
which are used to assess the performance of a software application  
MITRE: A collection of non-profit research and development centers  
Modem: A device that connects your router to the internet and brings internet access  
to the LAN  
Module: A Python file that contains additional functions, variables, classes, and any  
kind of runnable code  
Monitor: The seventh step of the NIST RMF that means be aware of how systems are  
operating  
Multi-factor authentication (MFA): A security measure that requires a user to verify  
their identity in two or more ways to access a system or network  
N  
nano: A command-line file editor that is available by default in many Linux distributions  
National Institute of Standards and Technology (NIST) Cybersecurity Framework  
(CSF): A voluntary framework that consists of standards, guidelines, and best  
practices to manage cybersecurity risk  
National Institute of Standards and Technology (NIST) Incident Response  
Lifecycle: A framework for incident response consisting of four phases: Preparation;

Detection and Analysis; Containment, Eradication and Recovery, and Post-incident  
activity  
National Institute of Standards and Technology (NIST) Special Publication (S.P.)  
800-53: A unified framework for protecting the security of information systems within  
the U.S. federal government  
Network: A group of connected devices  
Network-based intrusion detection system (NIDS): An application that collects and  
monitors network traffic and network data  
Network data: The data that’s transmitted between devices on a network  
Network Interface Card (NIC): Hardware that connects computers to a network  
Network log analysis: The process of examining network logs to identify events of  
interest  
Network protocol analyzer (packet sniffer): A tool designed to capture and analyze  
data traffic within a network  
Network protocols: A set of rules used by two or more devices on a network to  
describe the order of delivery and the structure of data  
Network security: The practice of keeping an organization's network infrastructure  
secure from unauthorized access  
Network segmentation: A security technique that divides the network into segments  
Network traffic: The amount of data that moves across a network  
Non-repudiation: The concept that the authenticity of information can’t be denied  
Notebook: An online interface for writing, storing, and running code  
Numeric data: Data consisting of numbers  
O  
OAuth: An open-standard authorization protocol that shares designated access  
between applications

Object: A data type that stores data in a comma-separated list of key-value pairs  
On-path attack: An attack where a malicious actor places themselves in the middle of  
an authorized connection and intercepts or alters the data in transit  
Open-source intelligence (OSINT): The collection and analysis of information from  
publicly available sources to generate usable intelligence  
Open systems interconnection (OSI) model: A standardized concept that describes  
the seven layers computers use to communicate and send data over the network  
Open Web Application Security Project/Open Worldwide Application Security  
Project (OWASP): A non-profit organization focused on improving software security  
Operating system (OS): The interface between computer hardware and the user  
Operator: A symbol or keyword that represents an operation  
Options: Input that modifies the behavior of a command  
Order of volatility: A sequence outlining the order of data that must be preserved  
from first to last  
OWASP Top 10: A globally recognized standard awareness document that lists the top  
10 most critical security risks to web applications  
P  
Package: A piece of software that can be combined with other packages to form an  
application  
Package manager: A tool that helps users install, manage, and remove packages or  
applications  
Packet capture (P-cap): A file containing data packets intercepted from an interface  
or network  
Packet sniffing: The practice of capturing and inspecting data packets across a  
network  
Parameter (Python): An object that is included in a function definition for use in that  
function

Parrot: An open-source distribution that is commonly used for security  
Parsing: The process of converting data into a more readable format  
Passive packet sniffing: A type of attack where a malicious actor connects to a  
network hub and looks at all traffic on the network  
Password attack: An attempt to access password secured devices, systems,  
networks, or data  
Patch update: A software and operating system update that addresses security  
vulnerabilities within a program or product  
Payment Card Industry Data Security Standards (PCI DSS): Any cardholder data  
that an organization accepts, transmits, or stores  
Penetration test (pen test): A simulated attack that helps identify vulnerabilities in  
systems, networks, websites, applications, and processes  
PEP 8 style guide: A resource that provides stylistic guidelines for programmers  
working in Python  
Peripheral devices: Hardware components that are attached and controlled by the  
computer system  
Permissions: The type of access granted for a file or directory  
Personally identifiable information (PII): Any information used to infer an individual's  
identity  
Phishing: The use of digital communications to trick people into revealing sensitive  
data or deploying malicious software  
Phishing kit: A collection of software tools needed to launch a phishing campaign  
Physical attack: A security incident that affects not only digital but also physical  
environments where the incident is deployed  
Physical social engineering: An attack in which a threat actor impersonates an  
employee, customer, or vendor to obtain unauthorized access to a physical location  
Ping of death: A type of DoS attack caused when a hacker pings a system by sending  
it an oversized ICMP packet that is bigger than 64KB  
Playbook: A manual that provides details about any operational action

Policy: A set of rules that reduce risk and protect information  
Port: A software-based location that organizes the sending and receiving of data  
between devices on a network  
Port filtering: A firewall function that blocks or allows certain port numbers to limit  
unwanted communication  
Post-incident activity: The process of reviewing an incident to identify areas for  
improvement during incident handling  
Potentially unwanted application (PUA): A type of unwanted software that is  
bundled in with legitimate programs which might display ads, cause device slowdown,  
or install other software  
Private data: Information that should be kept from the public  
Prepare: The first step of the NIST RMF related to activities that are necessary to  
manage security and privacy risks before a breach occurs  
Prepared statement: A coding technique that executes SQL statements before  
passing them on to a database  
Primary key: A column where every row has a unique entry  
Principle of least privilege: The concept of granting only the minimal access and  
authorization required to complete a task or function  
Privacy protection: The act of safeguarding personal information from unauthorized  
use  
Procedures: Step-by-step instructions to perform a specific security task  
Process of Attack Simulation and Threat Analysis (PASTA): A popular threat  
modeling framework that’s used across many industries  
Programming: A process that can be used to create a specific set of instructions for a  
computer to execute tasks  
Protect: A NIST core function used to protect an organization through the  
implementation of policies, procedures, training, and tools that help mitigate  
cybersecurity threats

Protected health information (PHI): Information that relates to the past, present, or  
future physical or mental health or condition of an individual  
Protecting and preserving evidence: The process of properly working with fragile  
and volatile digital evidence  
Proxy server: A server that fulfills the requests of its clients by forwarding them to  
other servers  
Public data: Data that is already accessible to the public and poses a minimal risk to  
the organization if viewed or shared by others  
Public key infrastructure (PKI): An encryption framework that secures the exchange  
of online information  
Python Standard Library: An extensive collection of Python code that often comes  
packaged with Python  
Q  
Query: A request for data from a database table or a combination of tables  
Quid pro quo: A type of baiting used to trick someone into believing that they’ll be  
rewarded in return for sharing access, information, or money  
R  
Rainbow table: A file of pre-generated hash values and their associated plaintext  
Random Access Memory (RAM): A hardware component used for short-term  
memory  
Ransomware: A malicious attack where threat actors encrypt an organization’s data  
and demand payment to restore access  
Rapport: A friendly relationship in which the people involved understand each other’s  
ideas and communicate well with each other  
Recover: A NIST core function related to returning affected systems back to normal  
operation

Recovery: The process of returning affected systems back to normal operations  
Red Hat® Enterprise Linux® (also referred to simply as Red Hat in this course): A  
subscription-based distribution of Linux built for enterprise use  
Reflected XSS attack: An instance when malicious script is sent to a server and  
activated during the server’s response  
Regular expression (regex): A sequence of characters that forms a pattern  
Regulations: Rules set by a government or other authority to control the way  
something is done  
Relational database: A structured database containing tables that are related to each  
other  
Relative file path: A file path that starts from the user's current directory  
Replay attack: A network attack performed when a malicious actor intercepts a data  
packet in transit and delays it or repeats it at another time  
Resiliency: The ability to prepare for, respond to, and recover from disruptions  
Respond: A NIST core function related to making sure that the proper procedures are  
used to contain, neutralize, and analyze security incidents, and implement  
improvements to the security process  
Return statement: A Python statement that executes inside a function and sends  
information back to the function call  
Reverse proxy server: A server that regulates and restricts the internet's access to an  
internal server  
Risk: Anything that can impact the confidentiality, integrity, or availability of an asset  
Risk mitigation: The process of having the right procedures and rules in place to  
quickly reduce the impact of a risk like a breach  
Root directory: The highest-level directory in Linux  
Rootkit: Malware that provides remote, administrative access to a computer  
Root user (or superuser): A user with elevated privileges to modify the system  
Router: A network device that connects multiple networks together

S  
Salting: An additional safeguard that’s used to strengthen hash functions  
Scareware: Malware that employs tactics to frighten users into infecting their device  
Search Processing Language (SPL): Splunk’s query language  
Secure File Transfer Protocol (SFTP): A secure protocol used to transfer files from  
one device to another over a network  
Secure shell (SSH): A security protocol used to create a shell with a remote system  
Security architecture: A type of security design composed of multiple components,  
such as tools and processes, that are used to protect an organization from risks and  
external threats  
Security audit: A review of an organization's security controls, policies, and  
procedures against a set of expectations  
Security controls: Safeguards designed to reduce specific security risks  
Security ethics: Guidelines for making appropriate decisions as a security  
professional  
Security frameworks: Guidelines used for building plans to help mitigate risk and  
threats to data and privacy  
Security governance: Practices that help support, define, and direct security efforts  
of an organization  
Security hardening: The process of strengthening a system to reduce its  
vulnerabilities and attack surface  
Security information and event management (SIEM): An application that collects  
and analyzes log data to monitor critical activities in an organization  
Security mindset: The ability to evaluate risk and constantly seek out and identify the  
potential or actual breach of a system, application, or data  
Security operations center (SOC): An organizational unit dedicated to monitoring  
networks, systems, and devices for security threats or attacks

Security orchestration, automation, and response (SOAR): A collection of  
applications, tools, and workflows that use automation to respond to security events  
Security posture: An organization’s ability to manage its defense of critical assets and  
data and react to change  
Security zone: A segment of a company’s network that protects the internal network  
from the internet  
Select: The third step of the NIST RMF that means to choose, customize, and capture  
documentation of the controls that protect an organization  
Sensitive data: A type of data that includes personally identifiable information (PII),  
sensitive personally identifiable information (SPII), or protected health information  
(PHI)  
Sensitive personally identifiable information (SPII): A specific type of PII that falls  
under stricter handling guidelines  
Separation of duties: The principle that users should not be given levels of  
authorization that would allow them to misuse a system  
Session: a sequence of network HTTP requests and responses associated with the  
same user  
Session cookie: A token that websites use to validate a session and determine how  
long that session should last  
Session hijacking: An event when attackers obtain a legitimate user’s session ID  
Session ID: A unique token that identifies a user and their device while accessing a  
system  
Set data: Data that consists of an unordered collection of unique values  
Shared responsibility: The idea that all individuals within an organization take an  
active role in lowering risk and maintaining both physical and virtual security  
Shell: The command-line interpreter  
Signature: A pattern that is associated with malicious activity  
Signature analysis: A detection method used to find events of interest

Simple Network Management Protocol (SNMP): A network protocol used for  
monitoring and managing devices on a network  
Single sign-on (SSO): A technology that combines several different logins into one  
Smishing: The use of text messages to trick users to obtain sensitive information or to  
impersonate a known source  
Smurf attack: A network attack performed when an attacker sniffs an authorized  
user’s IP address and floods it with ICMP packets  
Social engineering: A manipulation technique that exploits human error to gain  
private information, access, or valuables  
Social media phishing: A type of attack where a threat actor collects detailed  
information about their target on social media sites before initiating the attack  
Spear phishing: A malicious email attack targeting a specific user or group of users,  
appearing to originate from a trusted source  
Speed: The rate at which a device sends and receives data, measured by bits per  
second  
Splunk Cloud: A cloud-hosted tool used to collect, search, and monitor log data  
Splunk Enterprise: A self-hosted tool used to retain, analyze, and search an  
organization's log data to provide security information and alerts in real-time  
Spyware: Malware that’s used to gather and sell information without consent  
SQL (Structured Query Language): A programming language used to create, interact  
with, and request information from a database  
SQL injection: An attack that executes unexpected queries on a database  
Stakeholder: An individual or group that has an interest in any decision or activity of  
an organization  
Standard error: An error message returned by the OS through the shell  
Standard input: Information received by the OS via the command line  
Standard output: Information returned by the OS through the shell  
Standards: References that inform how to set policies

STAR method: An interview technique used to answer behavioral and situational  
questions  
Stateful: A class of firewall that keeps track of information passing through it and  
proactively filters out threats  
Stateless: A class of firewall that operates based on predefined rules and that does  
not keep track of information from data packets  
Stored XSS attack: An instance when malicious script is injected directly on the server  
String concatenation: The process of joining two strings together  
String data: Data consisting of an ordered sequence of characters  
Style guide: A manual that informs the writing, formatting, and design of documents  
Subnetting: The subdivision of a network into logical groups called subnets  
Substring: A continuous sequence of characters within a string  
Sudo: A command that temporarily grants elevated permissions to specific users  
Supply-chain attack: An attack that targets systems, applications, hardware, and/or  
software to locate a vulnerability where malware can be deployed  
Suricata: An open-source intrusion detection system, intrusion prevention system, and  
network analysis tool  
Switch: A device that makes connections between specific devices on a network by  
sending and receiving data between them  
Symmetric encryption: The use of a single secret key to exchange information  
Synchronize (SYN) flood attack: A type of DoS attack that simulates a TCP/IP  
connection and floods a server with SYN packets  
Syntax: The rules that determine what is correctly structured in a computing language  
Syntax error: An error that involves invalid usage of a programming language  
T  
Tailgating: A social engineering tactic in which unauthorized people follow an  
authorized person into a restricted area

TCP/IP model: A framework used to visualize how data is organized and transmitted  
across a network  
tcpdump: A command-line network protocol analyzer  
Technical skills: Skills that require knowledge of specific tools, procedures, and  
policies  
Telemetry: The collection and transmission of data for analysis  
Threat: Any circumstance or event that can negatively impact assets  
Threat actor: Any person or group who presents a security risk  
Threat hunting: The proactive search for threats on a network  
Threat intelligence: Evidence-based threat information that provides context about  
existing or emerging threats  
Threat modeling: The process of identifying assets, their vulnerabilities, and how each  
is exposed to threats  
Transferable skills: Skills from other areas that can apply to different careers  
Transmission Control Protocol (TCP): An internet communication protocol that  
allows two devices to form a connection and stream data  
Triage: The prioritizing of incidents according to their level of importance or urgency  
Trojan horse: Malware that looks like a legitimate file or program  
True negative: A state where there is no detection of malicious activity  
True positive An alert that correctly detects the presence of an attack  
Tuple data: Data structure that consists of a collection of data that cannot be changed  
Type error: An error that results from using the wrong data type  
U  
Ubuntu: An open-source, user-friendly distribution that is widely used in security and  
other industries

Unauthorized access: An incident type that occurs when an individual gains digital or  
physical access to a system or application without permission  
Uncontrolled zone: Any network outside your organization's control  
Unified Extensible Firmware Interface (UEFI): A microchip that contains loading  
instructions for the computer and replaces BIOS on more modern systems  
USB baiting: An attack in which a threat actor strategically leaves a malware USB stick  
for an employee to find and install to unknowingly infect a network  
User: The person interacting with a computer  
User Datagram Protocol (UDP): A connectionless protocol that does not establish a  
connection between devices before transmissions  
User-defined function: A function that programmers design for their specific needs  
User interface: A program that allows the user to control the functions of the  
operating system  
User provisioning: The process of creating and maintaining a user's digital identity  
V  
Variable: A container that stores data  
Virtual machine (VM): A virtual version of a physical computer  
Virtual Private Network (VPN): A network security service that changes your public  
IP address and hides your virtual location so that you can keep your data private when  
you are using a public network like the internet  
Virus: Malicious code written to interfere with computer operations and cause  
damage to data and software  
VirusTotal: A service that allows anyone to analyze suspicious files, domains, URLs,  
and IP addresses for malicious content  
Vishing: The exploitation of electronic voice communication to obtain sensitive  
information or to impersonate a known source  
Visual dashboard: A way of displaying various types of data quickly in one place

Vulnerability: A weakness that can be exploited by a threat  
Vulnerability assessment: The internal review process of an organization's security  
systems  
Vulnerability management: The process of finding and patching vulnerabilities  
Vulnerability scanner: Software that automatically compares existing common  
vulnerabilities and exposures against the technologies on the network  
W  
Watering hole attack: A type of attack when a threat actor compromises a website  
frequently visited by a specific group of users  
Web-based exploits: Malicious code or behavior that’s used to take advantage of  
coding flaws in a web application  
Whaling: A category of spear phishing attempts that are aimed at high-ranking  
executives in an organization  
Wide Area Network (WAN): A network that spans a large geographic area like a city,  
state, or country  
Wi-Fi Protected Access (WPA): A wireless security protocol for devices to connect to  
the internet  
Wildcard: A special character that can be substituted with any other character  
Wireshark: An open-source network protocol analyzer  
World-writable file: A file that can be altered by anyone in the world  
Worm: Malware that can duplicate and spread itself across systems on its own  
Y  
YARA-L: A computer language used to create rules for searching through ingested log  
data  
Z

Zero-day: An exploit that was previously unknown

# Welcome to week 1

Before securing a network, you need to understand the basic design of a network and how it functions.  
  
In this section of the course, you will learn about the structure of a network, standard networking tools, cloud networks, and the basic framework for organizing communications across a network called the TCP/IP model.  
  
Securing networks is a big part of a security analyst's responsibilities, so I'm excited to help you understand how to secure your organization's network from threats, risks, and vulnerabilities.  
  
Let's get going!

# Chris: My path to cybersecurity

My name is Chris and I'm the Chief Information Security Officer at Google Fiber. We provide high speed Internet to customers across the United States. As the chief information security officer, I'm responsible for making sure that the network stays safe, our customers' data stays safe and that we are supporting law enforcement and others as required. The career path was a long and winding one. My actual first job was working as a butcher at the family grocery store. I eventually ended up with a job in the computer center at college, which is where I learned a lot of my initial computer skills. Then when I graduated from college, I started off as a software developer, designing accounting software for a consulting company supporting the Department of Agriculture. Then I moved on from that to other roles, eventually ending up in one of the first Internet over cable companies. I ran several of their services, email, web services, etc. My stuff kept getting attacked. I fell into cybersecurity because I had to defend the things that I was building. I realized it was fun. I realized that it was a great career opportunity. I've just stuck with that ever since then. When I got into this field, other than a couple of books, there wasn't a lot of training material out there. There were some other people out there that I could ask questions of, and I could get some mentoring from. But as a general rule of thumb, I was on my own. Despite this being a fairly technical field, the most important thing you're going to learn are the connections you're going to make to other people. I made a conscious decision to become actively involved in some of the outside work organizations, the trade associations, the non profits, the meet ups, and other cybersecurity organizations. This enabled me to build the reputation and the relationships so that as my career moved along, people were reaching out to me saying, hey Chris, we have this opportunity, are you interested? Because the cybersecurity industry is so varied, it can seem like there is a tremendous amount you have to learn that there is this huge step that you have to take in order to get into the industry. That can be daunting. But the thing to remember is, once you have that fundamental level of skills and fundamental level of background, there are so many different directions you can go and there's so much opportunity out there. There's this continuous education and curiosity aspect of the job that is so much fun. It means that you are always having the opportunity to learn something new, to change directions and go in new ways because cybersecurity is going to be constantly changing. And that's part of the fun.

# What are networks?

Welcome! Before you can understand the importance of securing a network, you need to know what a network is.  
  
A network is a group of connected devices. At home, the devices connected to your network might be your laptop, cell phones, and smart devices, like your refrigerator or air conditioner. In an office, devices like workstations, printers, and servers all connect to the network. The devices on a network can communicate with each other over network cables, or wireless connections. Networks in your home and office can communicate with networks in other locations, and the devices on them.  
  
Devices need to find each other on a network to establish communications. These devices will use unique addresses, or identifiers, to locate each other. The addresses will ensure that communications happens with the right device. These are called the IP and MAC addresses.  
  
Devices can communicate on two types of networks: a local area network, also known as a LAN, and a wide area network, also known as a WAN.  
  
A local area network, or LAN, spans a small area like an office building, a school, or a home. For example, when a personal device like your cell phone or tablet connects to the WIFI in your house, they form a LAN. The LAN then connects to the internet.  
  
A wide area network or WAN spans a large geographical area like a city, state, or country. You can think of the internet as one big WAN. An employee of a company in San Francisco can communicate and share resources with another employee in Dublin, Ireland over the WAN.  
  
Now that you've learned about the structure and types of networks, meet me in an upcoming video to learn about the devices that connect to them.

# Tina: Working in network security

My name is Tina and I'm a software engineer at Google. As a software engineer, I work on an internal tool that serves the security engineers and network engineers at Google. Network security is important because we want to make sure that our network systems are safe and resilient to be able to defend against malicious hackers, and that we have the ability to protect our user data. Working with network security allows to see the overview of the whole company's network systems, which is super cool. My favorite part of my job is the impact I get to have on the community that I serve at Google. I would say most of my day is a lot of coding, design, talking to security teams and network teams on their priorities and their blockers and being able to come up with a solution. There are often going to be requests that come from network teams and security teams that have specific requirements on certain platforms or on a feature that they need in one of the network policies, and usually we would escalate that and try to work on a fix for that. One piece of advice I would give for someone who wants to take on the cybersecurity journey is to be able to always keep learning and be curious about how things work. Because security is an ever changing field, cybersecurity is definitely a team sport. Everybody has something to contribute, and especially on cybersecurity problems, there can be a lot of possibilities and a lot of different solutions to one problem. It's always great to be able to have people to brainstorm with and to track down issues together because things can get very complex sometimes, but it's also a fun process to be able to work on things together.

# Emmanuel: Useful skills for network security

My name is Emmanuel and I am an offensive security engineer at Google. For offensive security, my job is to simulate adversaries and threats that are targeting various companies and I look at defending how we can protect Google's infrastructure. I make it harder to hack Google by actually hacking Google. The technical skills that I use is a lot of programming, as well as learning about operational and platform security. Knowing how these computers work, what is under the hood, and understanding the components that create this infrastructure. An entry-level cybersecurity analyst would look at using command lines, log parsing, and network traffic analysis in their everyday scope of work. Command line allows you to interact with various levels of your operating system, whether it's the low-level things like the memory and the kernel, or if it's high-level things like the applications and the programs that you're running on your computer. With log parsing, they're going to be times where you may need to figure out and debug what is going on in your program or application and these logs are there to help you and support you in finding the root issue and then resolve it from there. With this network traffic analysis, there may be times where you need to figure out why is my Internet going slow? Why is traffic not being routed to the appropriate destination? What can I do to ensure that my network is up and running? Network traffic analysis is looking at network across various application and network layers and seeing what that traffic is doing, how we can secure that traffic, as well as identify any vulnerabilities and concerns. In the contexts for me, for security, I look at: are passwords being leaked in the traffic that's being sent across the network? Are infrastructures being secured? Are firewalls being readily configured and configured safely? One skill that has continued to grow with me in my current role has been communicating effectively to product teams, engineers, and identifying an issue that is influencing or affecting the business, and communicating to those teams effectively to fix it. Being able to take on these many hats and explain things with the right business approach to things to ensure that the issues that I do find in my work are identified but there are also fixed. My advice to folks who are taking this certificate would take things apart, feel uncomfortable, learn and grow and find opportunities to learn and understand how things work and that skill set will benefit you for the remainder of your journey.

# tech enthusiest reminder

A hub is a network device that broadcasts information to every device on the network.

# Network tools

In this video, you'll learn about the common devices that make up a network. Let's get started.  
  
A hub is a network device that broadcasts information to every device on the network. Think of a hub like a radio tower that broadcasts a signal to any radio tuned to the correct frequency.  
  
Another network device is a switch. A switch makes connections between specific devices on a network by sending and receiving data between them. A switch is more intelligent than a hub. It only passes data to the intended destination. This makes switches more secure than hubs, and enables them to control the flow of traffic and improve network performance.  
  
Another device that we'll discuss is a router. A router is a network device that connects multiple networks together.  
  
For example, if a computer in one network wants to send information to a tablet on another network, then the information will be transferred as follows: First, the information travels from the computer to the router. Then, the router reads the destination address, and forwards the data to the intended network's router. Finally, the receiving router directs that information to the tablet.  
  
Finally, let's discuss modems. A modem is a device that connects your router to the internet, and brings internet access to the LAN.  
  
For example, if a computer from one network wants to send information to a device on a network in a different geographic location, it would be transferred as follows: The computer would send information to the router, and the router would then transfer the information through the modem to the internet. The intended recipient's modem receives the information, and transfers it to the router. Finally, the recipient's router forwards that information to the destination device.  
  
Network tools such as hubs, switches, routers, and modems are physical devices. However, many functions performed by these physical devices can be completed by virtualization tools.  
  
Virtualization tools are pieces of software that perform network operations. Virtualization tools carry out operations that would normally be completed by a hub, switch, router, or modem, and they are offered by Cloud service providers. These tools provide opportunities for cost savings and scalability. You'll learn more about them later in the certificate program.  
  
Now you've explored some common devices that make up a network. Coming up, you're going to learn more about cloud computing, and how networks can be designed using cloud services.

# Network components, devices, and diagrams

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this section of the course, you will learn about network architecture. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Once you have a foundational understanding of network architecture, sometimes referred to as network design, you will learn about security vulnerabilities inherent in all networks and how malicious actors attempt to exploit them. In this reading, you will review network devices and connections and investigate a simple network diagram similar to those used every day by network security professionals. Essential tasks of a security analyst include setting up the tools, devices, and protocols used to observe and secure network traffic. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Devices on a network</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network devices are the devices that maintain information and services for users of a network. These devices connect over wired and wireless connections. After establishing a connection to the network, the devices send data packets. The data packets provide information about the source and the destination of the data.</span>

<div class="rc-CML" dir="auto" id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A network diagram displaying how different devices are connected to an internal network](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/URorDIh9TNiq7e481RWHmQ_85911828bd7c43b38761dd2b520e8df1_CS_R-041_-Edited-S34G001-1-.png?expiry=1687996800000&hmac=S_FRskfoTz5n1GqzIJ5uFab8Tr6mZVht7Uf85MA5Q3k)</figure></div></div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Devices and desktop computers** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Most internet users are familiar with everyday devices, such as personal computers, laptops, mobile phones, and tablets. Each device and desktop computer has a unique MAC address and IP address, which identify it on the network, and a network interface that sends and receives data packets. These devices can connect to the network via a hard wire or a wireless connection.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Firewalls**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**firewall**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a network security device that monitors traffic to or from your network. Firewalls can also restrict specific incoming and outgoing network traffic. The organization configures the security rules. Firewalls often reside between the secured and controlled internal network and the untrusted network resources outside the organization, such as the internet.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Servers** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Servers provide a service for other devices on the network. The devices that connect to a server are called clients. The following graphic outlines this model, which is called the client-server model. In this model, clients send requests to the server for information and services. The server performs the requests for the clients. Common examples include DNS servers that perform domain name lookups for internet sites, file servers that store and retrieve files from a database, and corporate mail servers that organize mail for a company. </span>

<div class="rc-CML" dir="auto" id="bkmrk--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A client server model showing three client devices sending requests and receiving responses from a database server.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/FI4hBJhWTEyWNXoKI9EgsA_5a3867623fe5482aa3cb88b2e17fd3f1_m11tx1zMlcjG_2VzVR5QC6doDnVW9U6b0n04lmDZCi1BdjEjt-owNV78CEYLQeX_OoblVT1iYfESmwKKY7KkWUA-CB_bQXn--BroYC9c6GVbiZT1DJimU5CCOfNOz8HTQJUVivm8pNKK7NHRzv3W9INsegVffLpT23LJ2sXvgAdmHUwchtuJksNQwLqw70E?expiry=1687996800000&hmac=yFMOhyzJY_0foCaPGyKAOH9imF-P0SyVUZUwB-Qk43Q)</figure></div></div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Hubs and switches**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Hubs and switches both direct traffic on a local network. A hub is a device that provides a common point of connection for all devices directly connected to it. Hubs additionally repeat all information out to all ports. From a security perspective, this makes hubs vulnerable to eavesdropping. For this reason, hubs are not used as often on modern networks; most organizations use switches instead. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A switch forwards packets between devices directly connected to it. It maintains a MAC address table that matches MAC addresses of devices on the network to port numbers on the switch and forwards incoming data packets according to the destination MAC address.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Routers**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Routers sit between networks and direct traffic, based on the IP address of the destination network. The IP address of the destination network is contained in the IP header. The router reads the header information and forwards the packet to the next router on the path to the destination. This continues until the packet reaches the destination network. Routers can also include a firewall feature that allows or blocks incoming traffic based on information in the transmission. This stops malicious traffic from entering the private network and damaging the local area network. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Modems and wireless access points**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Modems**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Modems usually interface with an internet service provider (ISP). ISPs provide internet connectivity via telephone lines or coaxial cables. Modems receive transmissions from the internet and translate them into digital signals that can be understood by the devices on the network. Usually, modems connect to a router that takes the decoded transmissions and sends them on to the local network. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Enterprise networks used by large organizations to connect their users and devices often use other broadband technologies to handle high-volume traffic, instead of using a modem. </span>

<div class="rc-CML" dir="auto" id="bkmrk--2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A modem converting data from the internet, connecting to a Wi-Fi router](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/5cpm9ICmSJCX3MLFfqT6kw_a636fcf868104322ad316bc98fabc3f1_S34G002.png?expiry=1687996800000&hmac=JHPlbqP7s2ow8VWpPx7QjVEWEynB0dZq0kyZLSFJa_o)</figure></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Wireless access point**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A wireless access point sends and receives digital signals over radio waves creating a wireless network. Devices with wireless adapters connect to the access point using Wi-Fi. Wi-Fi refers to a set of standards that are used by network devices to communicate wirelessly. Wireless access points and the devices connected to them use Wi-Fi protocols to send data through radio waves where they are sent to routers and switches and directed along the path to their final destination.</span>

<div class="rc-CML" dir="auto" id="bkmrk--3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A wireless access point connected to wired and wireless devices on a network](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/dI_SIruhQeuOZZVnzI6fmA_36c5e1379c0f4990a6fe0ac0c27763f1_S34G003.png?expiry=1687996800000&hmac=F1xtytsIPbbPCiVmETZNYydxeoSqQlSrGlAD9AAi838)</figure></div></div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Using network diagrams as a security analyst</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network diagrams allow network administrators and security personnel to imagine the architecture and design of their organization’s private network.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network diagrams are topographical maps that show the devices on the network and how they connect. Network diagrams use small representative graphics to portray each network device and dotted lines to show how each device connects to the other. Security analysts use network diagrams to learn about network architecture and how to design networks. </span>

<div class="rc-CML" dir="auto" id="bkmrk--4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A router connecting to two firewalls and creating two separate security zones](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/tj5DFJGVQDuBAxqnZ_AL2w_418d88f79e794c3082881500887fa7f1_CS_R-041_-Edited-S34G004.png?expiry=1687996800000&hmac=o6UMk_OJtkm4l2LYAdCBKwpFnLGJGsmVeE4lYqq1_Ds)</figure></div></div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In the client-server model, the client requests information and services from the server, and the server performs the requests for the clients. Network devices include routers, workstations, servers, hubs, switches, and modems. Security analysts use network diagrams to visualize network architecture.</span>

# Cloud networks

Companies have traditionally owned their network devices, and kept them in their own office buildings. But now, a lot of companies are using third-party providers to manage their networks.  
   
Why? Well, this model helps companies save money while giving them access to more network resources. The growth of cloud computing is helping many companies reduce costs and streamline their network operations.  
  
Cloud computing is the practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices.  
  
Today, the number of businesses that use cloud computing is increasing every year, so it's important to understand how cloud networks function and how to secure them.  
  
Cloud providers offer an alternative to traditional on-premise networks, and allow organizations to have the benefits of the traditional network without storing the devices and managing the network on their own.  
  
A cloud network is a collection of servers or computers that stores resources and data in a remote data center that can be accessed via the internet. Because companies don't house the servers at their physical location, these servers are referred to as being "in the cloud".  
  
Traditional networks host web servers from a business in its physical location. However, cloud networks are different from traditional networks because they use remote servers, which allow online services and web applications to be used from any geographic location. Cloud security will become increasingly relevant to many security professionals as more organizations migrate to cloud services.  
  
Cloud service providers offer cloud computing to maintain applications. For example, they provide on-demand storage and processing power that their customers only pay as needed. They also provide business and web analytics that organizations can use to monitor their web traffic and sales.  
  
With the transition to cloud networking, I have witnessed an overlap of identity-based security on top of the more traditional network-based solutions. This meant that my focus needed to be on verifying both where the traffic is coming from and the identity that is coming with it.  
  
More organizations are moving their network services to the cloud to save money and simplify their operations. As this trend has grown, cloud security has become a significant aspect of network security.

# Cloud networks

Companies have traditionally owned their network devices, and kept them in their own office buildings. But now, a lot of companies are using third-party providers to manage their networks.  
  
Why? Well, this model helps companies save money while giving them access to more network resources. The growth of cloud computing is helping many companies reduce costs and streamline their network operations.  
  
Cloud computing is the practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices.  
  
Today, the number of businesses that use cloud computing is increasing every year, so it's important to understand how cloud networks function and how to secure them.  
  
Cloud providers offer an alternative to traditional on-premise networks, and allow organizations to have the benefits of the traditional network without storing the devices and managing the network on their own.  
  
A cloud network is a collection of servers or computers that stores resources and data in a remote data center that can be accessed via the internet. Because companies don't house the servers at their physical location, these servers are referred to as being "in the cloud".  
  
Traditional networks host web servers from a business in its physical location. However, cloud networks are different from traditional networks because they use remote servers, which allow online services and web applications to be used from any geographic location. Cloud security will become increasingly relevant to many security professionals as more organizations migrate to cloud services.  
  
Cloud service providers offer cloud computing to maintain applications. For example, they provide on-demand storage and processing power that their customers only pay as needed. They also provide business and web analytics that organizations can use to monitor their web traffic and sales.  
  
With the transition to cloud networking, I have witnessed an overlap of identity-based security on top of the more traditional network-based solutions. This meant that my focus needed to be on verifying both where the traffic is coming from and the identity that is coming with it.  
  
More organizations are moving their network services to the cloud to save money and simplify their operations. As this trend has grown, cloud security has become a significant aspect of network security.

# Network Communication

# Introduction to network communication

Networks help organizations communicate and connect. But communication makes network attacks more likely because it gives a malicious actor an opportunity to take advantage of vulnerable devices and unprotected networks.  
  
Communication over a network happens when data is transferred from one point to another. Pieces of data are typically referred to as data packets.  
  
A data packet is a basic unit of information that travels from one device to another within a network. When data is sent from one device to another across a network, it is sent as a packet that contains information about where the packet is going, where it's coming from, and the content of the message.  
  
Think about data packets like a piece of physical mail. Imagine you want to send a letter to a friend. The envelope will need to have the address where you want the letter to go and your return address. Inside the envelope is a letter that contains the message that you want your friend to read.  
  
A data packet is very similar to a physical letter. It contains a header that includes the internet protocol address, the IP address, and the media access control, or MAC, address of the destination device. It also includes a protocol number that tells the receiving device what to do with the information in the packet. Then there's the body of the packet, which contains the message that needs to be transmitted to the receiving device. Finally, at the end of the packet, there's a footer, similar to a signature on a letter, the footer signals to the receiving device that the packet is finished.  
  
The movement of data packets across a network can provide an indication of how well the network is performing. Network performance can be measured by bandwidth.  
  
Bandwidth refers to the amount of data a device receives every second. You can calculate bandwidth by dividing the quantity of data by the time in seconds. Speed refers to the rate at which data packets are received or downloaded. Security personnel are interested in network bandwidth and speed because if either are irregular, it could be an indication of an attack. Packet sniffing is the practice of capturing and inspecting data packets across the network.  
  
Communication on the network is important for sharing resources and data because it allows organizations to function effectively. Coming up, you'll learn more about the protocols to support network communication.

# The TCP/IP model

  
Hello again. In this video, you'll learn more about communication protocols and devices used to communicate with each other across the internet. This is called the TCP/IP model.  
  
TCP/IP stands for Transmission Control Protocol and Internet Protocol. TCP/IP is the standard model used for network communication. Let's take a closer look at this model by defining TCP and IP separately.  
  
First, TCP, or Transmission Control Protocol, is an internet communication protocol that allows two devices to form a connection and stream data. The protocol includes a set of instructions to organize data, so it can be sent across a network. It also establishes a connection between two devices and makes sure that packets reach their appropriate destination.  
  
The IP in TCP/IP stands for Internet Protocol. IP has a set of standards used for routing and addressing data packets as they travel between devices on a network. Included in the Internet Protocol (IP) is the IP address that functions as an address for each private network. You'll learn more about IP addresses a bit later.  
  
When data packets are sent and received across a network, they are assigned a port.  
  
Within the operating system of a network device, a port is a software-based location that organizes the sending and receiving of data between devices on a network. Ports divide network traffic into segments based on the service they will perform between two devices. The computers sending and receiving these data segments know how to prioritize and process these segments based on their port number.  
  
This is like sending a letter to a friend who lives in an apartment building. The mail delivery person not only knows how to find the building, but they also know exactly where to go in the building to find the apartment number where your friend lives.  
  
Data packets include instructions that tell the receiving device what to do with the information. These instructions come in the form of a port number. Port numbers allow computers to split the network traffic and prioritize the operations they will perform with the data. Some common port numbers are: port 25, which is used for e-mail, port 443, which is used for secure internet communication, and port 20, for large file transfers.  
  
As you've learned in this video, a lot of information and instructions are contained in data packets as they travel across a network. Coming up, you'll learn more about the TCP/IP model.

# The four layers of the TCP/IP model

Now that we've discussed the structure of a network and how communications takes place, it's important for you to know how the security professionals identify problems that might arise.  
  
The TCP/IP model is a framework that is used to visualize how data is organized and transmitted across the network. The TCP/IP model has four layers. The four layers are: the network access layer, the internet layer, the transport layer, and the application layer.  
  
Knowing how the TCP/IP model organizes network activity allows security professionals to monitor and secure against risks.  
  
Let's examine these layers one at a time.  
  
Layer one is the network access layer. The network access layer deals with creation of data packets and their transmission across a network. This includes hardware devices connected to physical cables and switches that direct data to its destination.  
  
Layer two is the internet layer. The internet layer is where IP addresses are attached to data packets to indicate the location of the sender and receiver. The internet layer also focuses on how networks connect to each other. For example, data packets containing information that determine whether they will stay on the LAN or will be sent to a remote network, like the internet.  
  
The transport layer includes protocols to control the flow of traffic across a network. These protocols permit or deny communication with other devices and include information about the status of the connection. Activities of this layer include error control, which ensures data is flowing smoothly across the network.  
  
Finally, at the application layer, protocols determine how the data packets will interact with receiving devices. Functions that are organized at application layer include file transfers and email services.  
  
Now you have an understanding of the TCP/IP model and its four layers. Meet you in the next video.  
  
  
  
\---------------

##### what are the Layers of the TCP/IP model?  
  


1. Network access layer
2. Internet layer
3. Transport layer
4. Application layer

# Learn more about the TCP/IP model

In this reading, you will build on what you have learned about the Transmission Control Protocol/Internet Protocol (TCP/IP) model, consider the differences between the Open Systems Interconnection (OSI) model and TCP/IP model, and learn how they’re related. Then, you’ll review each layer of the TCP/IP model and go over common protocols used in each layer.

As a security professional, it's important that you understand the TCP/IP model because all communication on a network is organized using network protocols. Network protocols are a language that systems use to communicate with each other. In order for two network systems to successfully communicate with each other, they need to use the same protocol. The two most common models available are the TCP/IP and the OSI model. These models are a representative guideline of how network communications work together and move throughout the network and the host. The examples provided in this course will follow the TCP/IP model.

The TCP/IP model

The TCP/IP model is a framework used to visualize how data is organized and transmitted across a network. This model helps network engineers and network security analysts conceptualize processes on the network and communicate where disruptions or security threats occur.

The TCP/IP model has four layers: network access layer, internet layer, transport layer, and application layer. When troubleshooting issues on the network, security professionals can analyze and deduce which layer or layers an attack occurred based on what processes were involved in an incident.

Network access layer

The network access layer, sometimes called the data link layer, organizes sending and receiving data frames within a single network. This layer corresponds to the physical hardware involved in network transmission. Hubs, modems, cables, and wiring are all considered part of this layer. The address resolution protocol (ARP) is part of the network access layer. ARP assists IP with directing data packets on the same physical network by mapping IP addresses to MAC addresses on the same physical network.

Internet layer

The internet layer, sometimes referred to as the network layer, is responsible for ensuring the delivery to the destination host, which potentially resides on a different network. The internet layer determines which protocol is responsible for delivering the data packets. Here are some of the common protocols that operate at the internet layer:

Internet Protocol (IP). IP sends the data packets to the correct destination and relies on the Transmission Control Protocol/User Datagram Protocol (TCP/UDP) to deliver them to the corresponding service. IP packets allow communication between two networks. They are routed from the sending network to the receiving network. The TCP/UDP retransmits any data that is lost or corrupt.

Internet Control Message Protocol (ICMP). The ICMP shares error information and status updates of data packets. This is useful for detecting and troubleshooting network errors. The ICMP reports information about packets that were dropped or that disappeared in transit, issues with network connectivity, and packets redirected to other routers.

Transport layer

The transport layer is responsible for reliably delivering data between two systems or networks. TCP and UDP are the two transport protocols that occur at this layer.

Transmission Control Protocol

The TCP ensures that data is reliably transmitted to the destination service. TCP contains the port number of the intended destination service, which resides in the TCP header of an TCP/IP packet.

User Datagram Protocol

The UDP is used by applications that are not concerned with the reliability of the transmission. Data sent over UDP is not tracked as extensively as data sent using TCP. Because UDP does not establish network connections, it is used mostly for performance sensitive applications that operate in real time, such as video streaming.

Application layer

The application layer in the TCP/IP model is similar to the application, presentation, and session layers of the OSI model. The application layer is responsible for making network requests or responding to requests. This layer defines which internet services and applications any user can access. Some common protocols used on this layer are:

Hypertext transfer protocol (HTTP)

Simple mail transfer protocol (SMTP)

Secure shell (SSH)

File transfer protocol (FTP)

Domain name system (DNS)

Application layer protocols rely on underlying layers to transfer the data across the network.

TCP/IP model versus OSI model

The OSI visually organizes network protocols into different layers. Network professionals often use this model to communicate with each other about potential sources of problems or security threats when they occur.

The TCP/IP model combines multiple layers of the OSI model. There are many similarities between the two models. Both models define standards for networking and divide the network communication process into different layers. The TCP/IP model is a simplified version of the OSI model.

Key takeaways

Both the TCP/IP and OSI models are conceptual models that help network professionals visualize network processes and protocols in regards to data transmission between two or more systems. The TCP/IP model contains four layers, and the OSI model contains seven layers.

# The OSI model

So far in this section of the course, you learned about the components of a network, network devices, and how network communication occurs across a network.

All communication on a network is organized using network protocols. Previously, you learned about the Transmission Control Protocol (TCP), which establishes connections between two devices, and the Internet Protocol (IP), which is used for routing and addressing data packets as they travel between devices on a network. This reading will continue to explore the seven layers of the Open Systems Interconnection (OSI) model and the processes that occur at each layer. We will work backwards from layer seven to layer one, going from the processes that involve the everyday network user to those that involve the most basic networking components, like network cables and switches. This reading will also review the main differences between the TCP/IP and OSI models.

The TCP/IP model vs. the OSI model

The TCP/IP model is a framework used to visualize how data is organized and transmitted across a network. This model helps network engineers and network security analysts design the data network and conceptualize processes on the network and communicate where disruptions or security threats occur.

The TCP/IP model has four layers: network access layer, internet layer, transport layer, and application layer. When analyzing network events, security professionals can determine what layer or layers an attack occurred in based on what processes were involved in the incident.

The OSI model is a standardized concept that describes the seven layers computers use to communicate and send data over the network. Network and security professionals often use this model to communicate with each other about potential sources of problems or security threats when they occur.

Some organizations rely heavily on the TCP/IP model, while others prefer to use the OSI model. As a security analyst, it’s important to be familiar with both models. Both the TCP/IP and OSI models are useful for understanding how networks work.

Layer 7: Application layer

The application layer includes processes that directly involve the everyday user. This layer includes all of the networking protocols that software applications use to connect a user to the internet. This characteristic is the identifying feature of the application layer—user connection to the network via applications and requests.

An example of a type of communication that happens at the application layer is using a web browser. The internet browser uses HTTP or HTTPS to send and receive information from the website server. The email application uses simple mail transfer protocol (SMTP) to send and receive email information. Also, web browsers use the domain name system (DNS) protocol to translate website domain names into IP addresses which identify the web server that hosts the information for the website.

Layer 6: Presentation layer

Functions at the presentation layer involve data translation and encryption for the network. This layer adds to and replaces data with formats that can be understood by applications (layer 7) on both sending and receiving systems. Formats at the user end may be different from those of the receiving system. Processes at the presentation layer require the use of a standardized format.

Some formatting functions that occur at layer 6 include encryption, compression, and confirmation that the character code set can be interpreted on the receiving system. One example of encryption that takes place at this layer is SSL, which encrypts data between web servers and browsers as part of websites with HTTPS.

Layer 5: Session layer

A session describes when a connection is established between two devices. An open session allows the devices to communicate with each other. Session layer protocols occur to keep the session open while data is being transferred and terminate the session once the transmission is complete.

The session layer is also responsible for activities such as authentication, reconnection, and setting checkpoints during a data transfer. If a session is interrupted, checkpoints ensure that the transmission picks up at the last session checkpoint when the connection resumes. Sessions include a request and response between applications. Functions in the session layer respond to requests for service from processes in the presentation layer (layer 6) and send requests for services to the transport layer (layer 4).

Layer 4: Transport layer

The transport layer is responsible for delivering data between devices. This layer also handles the speed of data transfer, flow of the transfer, and breaking data down into smaller segments to make them easier to transport. Segmentation is the process of dividing up a large data transmission into smaller pieces that can be processed by the receiving system. These segments need to be reassembled at their destination so they can be processed at the session layer (layer 5). The speed and rate of the transmission also has to match the connection speed of the destination system. TCP and UDP are transport layer protocols.

Layer 3: Network layer

The network layer oversees receiving the frames from the data link layer (layer 2) and delivers them to the intended destination. The intended destination can be found based on the address that resides in the frame of the data packets. Data packets allow communication between two networks. These packets include IP addresses that tell routers where to send them. They are routed from the sending network to the receiving network.

Layer 2: Data link layer

The data link layer organizes sending and receiving data packets within a single network. The data link layer is home to switches on the local network and network interface cards on local devices.

Protocols like network control protocol (NCP), high-level data link control (HDLC), and synchronous data link control protocol (SDLC) are used at the data link layer.

Layer 1: Physical layer

As the name suggests, the physical layer corresponds to the physical hardware involved in network transmission. Hubs, modems, and the cables and wiring that connect them are all considered part of the physical layer. To travel across an ethernet or coaxial cable, a data packet needs to be translated into a stream of 0s and 1s. The stream of 0s and 1s are sent across the physical wiring and cables, received, and then passed on to higher levels of the OSI model.

Key takeaways

Both the TCP/IP and OSI models are conceptual models that help network professionals design network processes and protocols in regards to data transmission between two or more systems. The OSI model contains seven layers. Network and security professionals use the OSI model to communicate with each other about potential sources of problems or security threats when they occur. Network engineers and network security analysts use the TCP/IP and OSI models to conceptualize network processes and communicate the location of disruptions or threats.

# Local and wide network communication

  
Let's learn about how IP addresses are used to communicate over a network. IP stands for internet protocol. An internet protocol address, or IP address, is a unique string of characters that identifies a location of a device on the internet. Each device on the internet has a unique IP address, just like every house on a street has its own mailing address.  
  
There are two types of IP addresses: IP version 4, or IPv4, and IP version 6, or IPv6. Let's look at examples of an IPv4 address.  
  
IPv4 addresses are written as four, 1, 2, or 3-digit numbers separated by a decimal point. In the early days of the internet, IP addresses were all IPV4. But as the use of the internet grew, all the IPv4 addresses started to get used up, so IPv6 was developed.  
  
IPv6 addresses are made up of 32 characters. The length of the IPv6 address will allow for more devices to be connected to the internet without running out of addresses as quickly as IPv4.  
  
IP addresses can be either public or private. Your internet service provider assigns a public IP address that is connected to your geographic location. When network communications goes out from your device on the internet, they all have the same public-facing address. Just like all the roommates in one home share the same mailing address, all the devices on a network share the same public-facing IP address.  
  
Private IP addresses are only seen by other devices on the same local network. This means that all the devices on your home network can communicate with each other using unique IP addresses that the rest of the internet can't see.  
  
Another kind of address used in network communications is called a MAC address. A MAC address is a unique alphanumeric identifier that is assigned to each physical device on a network. When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port. It then keeps this information in a MAC address table. Think of the MAC address table like an address book that the switch uses to direct data packets to the appropriate device.  
  
In this video, you learned about IP version 4 and IP version 6 addresses. You learned how IP and MAC addresses are used in network communication and the difference between a public and a private IP address.

# Components of network layer communication

Components of network layer communication

In the reading about the OSI model  
, you learned about the seven layers of the OSI model that are used to conceptualize the way data is transmitted across the internet. In this reading, you will learn more about operations that take place at layer 3 of the OSI model: the network layer.

Operations at the network layer

Functions at the network layer organize the addressing and delivery of data packets across the network and internet from the host device to the destination device. This includes directing the packets from one router to another router across the internet, based on the internet protocol (IP) address of the destination network. The destination IP address is contained within the header of each data packet. This address will be stored for future routing purposes in routing tables along the packet’s path to its destination.

All data packets include an IP address; this is referred to as an IP packet or datagram. A router uses the IP address to route packets from network to network based on information contained in the IP header of a data packet. Header information communicates more than just the address of the destination. It also includes information such as the source IP address, the size of the packet, and which protocol will be used for the data portion of the packet.

Format of an IPv4 packet

Next, you can review the format of an IP version 4 (IPv4) packet and review a detailed graphic of the packet header. An IPv4 packet is made up of two sections, the header and the data:

The size of the IP header ranges from 20 to 60 bytes. The header includes the IP routing information that devices use to direct the packet. The format of an IP packet header is determined by the IPv4 protocol.

The length of the data section of an IPv4 packet can vary greatly in size. However, the maximum possible size of an IP packet is 65,536 bytes. It contains the message being transferred to the transmission, like website information or email text.

There are 13 fields within the header of an IPv4 packet:

Version: The first 4-bit header tells receiving devices what protocol the packet is using. The packet used in the illustration above is an IPv4 packet.

IP Header Length (HLEN): HLEN is the packet’s header length. This value indicates where the packet header ends and the data segment begins.

Type of Service (ToS): Routers prioritize packets for delivery to maintain quality of service on the network. The ToS field provides the router with this information.

Total Length: This field communicates the total length of the entire IP packet, including the header and data. The maximum size of an IPv4 packet is 65,535 bytes.

Identification: For IPv4 packets that are larger than 65, 535 bytes, the packets are divided, or fragmented, into smaller IP packets. The identification field provides a unique identifier for all the fragments of the original IP packet so that they can be reassembled once they reach their destination.

Flags: This field provides the routing device with more information about whether the original packet has been fragmented and if there are more fragments in transit.

Fragmentation Offset: The fragment offset field tells routing devices where in the original packet the fragment belongs.

Time to Live (TTL): TTL prevents data packets from being forwarded by routers indefinitely. It contains a counter that is set by the source. The counter is decremented by one as it passes through each router along its path. When the TTL counter reaches zero, the router currently holding the packet will discard the packet and return an ICMP Time Exceeded error message to the sender.

Protocol: The protocol field tells the receiving device which protocol will be used for the data portion of the packet.

Header Checksum: The header checksum field contains a checksum that can be used to detect corruption of the IP header in transit. Corrupted packets are discarded.

Source IP Address: The source IP address is the IPv4 address of the sending device.

Destination IP Address: The destination IP address is the IPv4 address of the destination device.

Options: The options field allows for security options to be applied to the packet if the HLEN value is greater than five. The field communicates these options to the routing devices.

Difference between IPv4 and IPv6

In an earlier part of this course, you learned about the history of IP addressing. As the internet grew, it became clear that all of the IPv4 addresses would eventually be depleted; this is called IPv4 address exhaustion. At the time, no one had anticipated how many computing devices would need an IP address in the future. IPv6 was developed to mitigate IPv4 address exhaustion and other related concerns.

One of the key differences between IPv4 and IPv6 is the length of the addresses. IPv4 addresses are numeric, made of 4 bytes, and allow for up to 4.3 billion possible addresses. IPv4 addresses are made up of four strings and the numbers range from 0 to 255. An example of an IPv4 address would be: 198.51.100.0. IPv6 addresses are hexadecimal, made up of 16 bytes, and allow for up to 340 undecillion addresses (340 followed by 36 zeros). An example of an IPv6 address would be: 2002:0db8:0000:0000:0000:ff21:0023:1234.

There are also some differences in the layout of an IPv6 packet header. The IPv6 header format is much simpler than IPv4. For example, the IPv4 Header includes the HLEN, Identification, and Flags fields, whereas the IPv6 does not. The IPv6 header introduces different fields not included in IPv4 headers, such as the Flow Label and Traffic Class.

There are some important security differences between IPv4 and IPv6. IPv6 offers more efficient routing and eliminates private address collisions that can occur on IPv4 when two devices on the same network are attempting to use the same address.

Key takeaways

Security analysts can use packet capturing tools, or PCAP, to inspect packets while they’re in transit. Analyzing the different fields in an IP address packet can be used to find out important security information about the packet. Some examples of security-related information found in IP address packets: where the packet is coming from, where it’s going, and which protocol it’s using. Understanding the data in an IPv4 data packet will allow you to make critical decisions about the security implications of packets that you inspect.

# Wrap-up

Hey, you made it! Well done! Let's wrap up what you've learned in this section of the course.  
  
We explored the structure of a network, including WANs and LANs. We also discussed standard networking tools like hubs, switches, routers, and modems. We briefly introduced cloud networks, and we discussed their benefits. We also spent some time on the TCP/IP model. As a reminder, technicians and security analysts often use this framework when communicating where network problems have occurred.  
  
That wraps up this section. Next, you'll learn more about network operations and how data is transmitted over wireless networks.  
  
  
bro i actuially listened to the extra reading like 5 times each

# Glossary terms from Course 3, Week 1

#   


## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Terms and definitions from Course 3, Week 1</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Bandwidth:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The maximum data transmission capacity over a network, measured by bits per second</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cloud computing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The practice of using remote servers, application, and network services that are hosted on the internet instead of on local physical devices</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cloud network:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Data packet:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A basic unit of information that travels from one device to another within a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Hub:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A network device that broadcasts information to every device on the network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Internet Protocol (IP):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A set of standards used for routing and addressing data packets as they travel between devices on a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Internet Protocol (IP) address:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A unique string of characters that identifies the location of a device on the internet</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Local Area Network (LAN):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A network that spans small areas like an office building, a school, or a home</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Media Access Control (MAC) address:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A unique alphanumeric identifier that is assigned to each physical device on a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Modem:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A device that connects your router to the internet and brings internet access to the LAN</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Network:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A group of connected devices</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Open systems interconnection (OSI) model:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A standardized concept that describes the seven layers computers use to communicate and send data over the network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Packet sniffing:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The practice of capturing and inspecting data packets across a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Port:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A software-based location that organizes the sending and receiving of data between devices on a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Router:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A network device that connects multiple networks together</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Speed:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The rate at which a device sends and receives data, measured by bits per second</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Subnetting:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The subdivision of a network into logical groups called subnets</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Switch:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A device that makes connections between specific devices on a network by sending and receiving data between them</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**TCP/IP model:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A framework used to visualize how data is organized and transmitted across a network</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Transmission Control Protocol (TCP):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">An internet communication protocol that allows two devices to form a connection and stream data</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**User Datagram Protocol (UDP):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A connectionless protocol that does not establish a connection between devices before transmissions</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Wide Area Network (WAN):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A network that spans a large geographic area like a city, state, or country</span>

# Introduction to network protocols

# Welcome to week 2, Network potocols

---

Congratulations on the progress you've made so far!  
In this section, you'll learn about how  
networks operate using tools and protocols.  
These are the concepts that you'll use every  
day in your work as a security analyst.  
The tools and protocols you'll learn in this section of  
the program will help you protect  
your organization's network from attacks.  
Did you know that malicious actors can take advantage of  
data moving from one device to another on a network?  
Thankfully, there are tools and  
protocols to ensure the network  
stays protected against this type of threat.  
As an example, I once identified an attack  
based solely on the fact they were  
using the wrong protocol.  
The network traffic volumes were right, and it  
was coming from a trusted IP,  
but it was on the wrong protocol,  
which tipped us off enough to shut down  
the attack before they caused real damage.  
First, we'll discuss some common network protocols.  
Then we'll discuss virtual private networks, or VPNs.  
And finally, we'll learn about  
firewall security zones and proxy servers.  
Now that you have an idea of where we're  
headed, let's get started.

#### Network protocols

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-networks-benefit-fro"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Networks benefit from having rules." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Networks benefit from having rules. </span></div><div aria-label="toggle video from current lecture segment: Rules ensure that data sent over" class="rc-Phrase active css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Rules ensure that data sent over </span></div><div aria-label="toggle video from the network gets to the right place." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network gets to the right place. </span></div><div aria-label="toggle video from These rules are known as network protocols." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These rules are known as network protocols. </span></div><div aria-label="toggle video from Network protocols are a set of" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network protocols are a set of </span></div><div aria-label="toggle video from rules used by two or more devices on" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">rules used by two or more devices on </span></div><div aria-label="toggle video from a network to describe the order of" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network to describe the order of </span></div><div aria-label="toggle video from delivery and the structure of the data." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">delivery and the structure of the data. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-use-a-scenario"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's use a scenario to demonstrate" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's use a scenario to demonstrate </span></div><div aria-label="toggle video from a few different types of network protocols" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a few different types of network protocols </span></div><div aria-label="toggle video from and how they work together on a network." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and how they work together on a network. </span></div><div aria-label="toggle video from Say you want to access your favorite recipe website." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Say you want to access your favorite recipe website. </span></div><div aria-label="toggle video from You go to the address bar at the top of" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You go to the address bar at the top of </span></div><div aria-label="toggle video from your browser and type in the website's address." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your browser and type in the website's address. </span></div><div aria-label="toggle video from For example: www.yummyrecipesforme.org." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example: www.yummyrecipesforme.org. </span></div><div aria-label="toggle video from Before you gain access to the website," class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Before you gain access to the website, </span></div><div aria-label="toggle video from your device will establish" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your device will establish </span></div><div aria-label="toggle video from communications with a web server." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">communications with a web server. </span></div><div aria-label="toggle video from That communication uses a protocol called" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That communication uses a protocol called </span></div><div aria-label="toggle video from the Transmission Control Protocol, or TCP." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the Transmission Control Protocol, or TCP. </span></div><div aria-label="toggle video from TCP is an internet communications protocol that allows" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">TCP is an internet communications protocol that allows </span></div><div aria-label="toggle video from two devices to form a connection and stream data." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two devices to form a connection and stream data. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-tcp-also-verifies-bo"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from TCP also verifies both devices" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">TCP also verifies both devices </span></div><div aria-label="toggle video from before allowing any further communications to take place." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">before allowing any further communications to take place. </span></div><div aria-label="toggle video from This is often referred to as a handshake." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is often referred to as a handshake. </span></div><div aria-label="toggle video from Once communication is established using a TCP handshake," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Once communication is established using a TCP handshake, </span></div><div aria-label="toggle video from a request is made to the network." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a request is made to the network. </span></div><div aria-label="toggle video from Using our example, we have requested" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Using our example, we have requested </span></div><div aria-label="toggle video from data from the Yummy Recipes For Me server." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data from the Yummy Recipes For Me server. </span></div><div aria-label="toggle video from Their servers will respond to that request and send" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Their servers will respond to that request and send </span></div><div aria-label="toggle video from data packets back to" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data packets back to </span></div><div aria-label="toggle video from your device so that you can view the web page." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your device so that you can view the web page. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-as-data-packets-move"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from As data packets move across the network," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As data packets move across the network, </span></div><div aria-label="toggle video from they move between network devices such as routers." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they move between network devices such as routers. </span></div><div aria-label="toggle video from The Address Resolution Protocol, or ARP, is used to" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The Address Resolution Protocol, or ARP, is used to </span></div><div aria-label="toggle video from determine the MAC address of" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">determine the MAC address of </span></div><div aria-label="toggle video from the next router or device on the path." class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the next router or device on the path. </span></div><div aria-label="toggle video from This ensures that the data gets to the right place." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This ensures that the data gets to the right place. </span></div><div aria-label="toggle video from Now the communication has been" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now the communication has been </span></div><div aria-label="toggle video from established and the destination device is known," class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">established and the destination device is known, </span></div><div aria-label="toggle video from it's time to access the Yummy Recipes For Me website." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it's time to access the Yummy Recipes For Me website. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-hypertext-transf"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The Hypertext Transfer Protocol Secure, or HTTPS, is" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The Hypertext Transfer Protocol Secure, or HTTPS, is </span></div><div aria-label="toggle video from a network protocol that provides a secure method of" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network protocol that provides a secure method of </span></div><div aria-label="toggle video from communication between client and website servers." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">communication between client and website servers. </span></div><div aria-label="toggle video from It allows your web browser to securely send a request" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It allows your web browser to securely send a request </span></div><div aria-label="toggle video from for a webpage to the Yummy Recipes For Me server" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">for a webpage to the Yummy Recipes For Me server </span></div><div aria-label="toggle video from and receive a webpage as a response." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and receive a webpage as a response. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--5"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-next-comes-a-protoco"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Next comes a protocol called the" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next comes a protocol called the </span></div><div aria-label="toggle video from Domain Name System, or DNS," class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Domain Name System, or DNS, </span></div><div aria-label="toggle video from which is a network protocol that translate" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is a network protocol that translate </span></div><div aria-label="toggle video from internet domain names into IP addresses." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">internet domain names into IP addresses. </span></div><div aria-label="toggle video from The DNS protocol sends" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The DNS protocol sends </span></div><div aria-label="toggle video from the domain name and the web address to" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the domain name and the web address to </span></div><div aria-label="toggle video from a DNS server that retrieves" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a DNS server that retrieves </span></div><div aria-label="toggle video from the IP address of the website you were trying to access," class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the IP address of the website you were trying to access, </span></div><div aria-label="toggle video from in this case, Yummy Recipes For Me." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in this case, Yummy Recipes For Me. </span></div><div aria-label="toggle video from The IP address is included as a destination address for" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The IP address is included as a destination address for </span></div><div aria-label="toggle video from the data packets traveling to" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the data packets traveling to </span></div><div aria-label="toggle video from the Yummy Recipes For Me web server." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the Yummy Recipes For Me web server. </span></div><div aria-label="toggle video from So just by visiting one website," class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So just by visiting one website, </span></div><div aria-label="toggle video from the device on your networks are" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the device on your networks are </span></div><div aria-label="toggle video from using four different protocols:" class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">using four different protocols: </span></div><div aria-label="toggle video from TCP, ARP, HTTPS, and DNS." class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">TCP, ARP, HTTPS, and DNS. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--6"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-these-are-just-some-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from These are just some of the protocols" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These are just some of the protocols </span></div><div aria-label="toggle video from used in network communications." class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">used in network communications. </span></div><div aria-label="toggle video from To help you learn more about the different protocols," class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To help you learn more about the different protocols, </span></div><div aria-label="toggle video from we'll discuss them further" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we'll discuss them further </span></div><div aria-label="toggle video from in an upcoming course material." class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in an upcoming course material. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--7"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-but-how-do-these-pro"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from But how do these protocols relate to security?" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But how do these protocols relate to security? </span></div><div aria-label="toggle video from Well, on the Yummy Recipes For Me website example," class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Well, on the Yummy Recipes For Me website example, </span></div><div aria-label="toggle video from we used HTTPS, which is" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we used HTTPS, which is </span></div><div aria-label="toggle video from a secure protocol that" class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a secure protocol that </span></div><div aria-label="toggle video from requests a webpage from a web server." class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">requests a webpage from a web server. </span></div><div aria-label="toggle video from HTTPS encrypts data using" class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">HTTPS encrypts data using </span></div><div aria-label="toggle video from the Secure Sockets Layer and Transport Layer Security," class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the Secure Sockets Layer and Transport Layer Security, </span></div><div aria-label="toggle video from otherwise known as SSL/TLS." class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">otherwise known as SSL/TLS. </span></div><div aria-label="toggle video from This helps keep the information secure from" class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This helps keep the information secure from </span></div><div aria-label="toggle video from malicious actors who want to steal valuable information." class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors who want to steal valuable information. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--8"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-that%27s-a-lot-of-info"><div aria-label="toggle video from That's a lot of information and" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That's a lot of information and </span></div><div aria-label="toggle video from a lot of protocols to remember." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a lot of protocols to remember. </span></div><div aria-label="toggle video from Throughout your career as a security analyst," class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Throughout your career as a security analyst, </span></div><div aria-label="toggle video from you'll become more familiar with" class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you'll become more familiar with </span></div><div aria-label="toggle video from network protocols and use them in your daily activities." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network protocols and use them in your daily activities. </span></div></div>

# Common network protocols

In this section of the course, you learned about network protocols and how they organize communication over a network. This reading will discuss network protocols in more depth and review some basic protocols that you have learned previously. You will also learn new protocols and discuss some of the ways protocols are involved in network security.

## Overview of network protocols

A **network protocol** is a set of rules used by two or more devices on a network to describe the order of delivery and the structure of data. Network protocols serve as instructions that come with the information in the data packet. These instructions tell the receiving device what to do with the data. Protocols are like a common language that allows devices all across the world to communicate with and understand each other.

Even though network protocols perform an essential function in network communication, security analysts should still understand their associated security implications. Some protocols have vulnerabilities that malicious actors exploit. For example, a nefarious actor could use the Domain Name System (DNS) protocol, which resolves web addresses to IP addresses, to divert traffic from a legitimate website to a malicious website containing malware. You’ll learn more about this topic in upcoming course materials.

## Three categories of network protocols

Network protocols can be divided into three main categories: communication protocols, management protocols, and security protocols. There are dozens of different network protocols, but you don’t need to memorize all of them for an entry-level security analyst role. However, it’s important for you to know the ones listed in this reading.

### **Communication protocols**

Communication protocols govern the exchange of information in network transmission. They dictate how the data is transmitted between devices and the timing of the communication. They also include methods to recover data lost in transit. Here are a few of them.

<div class="rc-CML" dir="auto" id="bkmrk-transmission-control"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Transmission Control Protocol (TCP)** is an internet communication protocol that allows two devices to form a connection and stream data. TCP uses a three-way handshake process. First, the device sends a synchronize (SYN) request to a server. Then the server responds with a SYN/ACK packet to acknowledge receipt of the device's request. Once the server receives the final ACK packet from the device, a TCP connection is established. In the TCP/IP model, TCP occurs at the transport layer.
- **User Datagram Protocol (UDP)** is a connectionless protocol that does not establish a connection between devices before a transmission. This makes it less reliable than TCP. But it also means that it works well for transmissions that need to get to their destination quickly. For example, one use of UDP is for internet gaming transmissions. In the TCP/IP model, UDP occurs at the transport layer.
- **Hypertext Transfer Protocol (HTTP)** is an application layer protocol that provides a method of communication between clients and website servers. HTTP uses port 80. HTTP is considered insecure, so it is being replaced on most websites by a secure version, called HTTPS. However, there are still many websites that use the insecure HTTP protocol. In the TCP/IP model, HTTP occurs at the application layer.
- **Domain Name System (DNS)** is a protocol that translates internet domain names into IP addresses. When a client computer wishes to access a website domain using their internet browser, a query is sent to a dedicated DNS server. The DNS server then looks up the IP address that corresponds to the website domain. DNS normally uses UDP on port 53. However, if the DNS reply to a request is large, it will switch to using the TCP protocol. In the TCP/IP model, DNS occurs at the application layer.

</div></div></div></div></div></div>### **Management Protocols**

The next category of network protocols is management protocols. Management protocols are used for monitoring and managing activity on a network. They include protocols for error reporting and optimizing performance on the network.

<div class="rc-CML" dir="auto" id="bkmrk-simple-network-manag"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Simple Network Management Protocol (SNMP)** is a network protocol used for monitoring and managing devices on a network. SNMP can reset a password on a network device or change its baseline configuration. It can also send requests to network devices for a report on how much of the network’s bandwidth is being used up. In the TCP/IP model, SNMP occurs at the application layer.
- **Internet Control Message Protocol (ICMP)** is an internet protocol used by devices to tell each other about data transmission errors across the network. ICMP is used by a receiving device to send a report to the sending device about the data transmission. ICMP is commonly used as a quick way to troubleshoot network connectivity and latency by issuing the “ping” command on a Linux operating system. In the TCP/IP model, ICMP occurs at the internet layer.

</div></div></div></div></div></div>### **Security Protocols**

Security protocols are network protocols that ensure that data is sent and received securely across a network. Security protocols use encryption algorithms to protect data in transit. Below are some common security protocols.

<div class="rc-CML" dir="auto" id="bkmrk-hypertext-transfer-p"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Hypertext Transfer Protocol Secure (HTTPS)** is a network protocol that provides a secure method of communication between clients and website servers. HTTPS is a secure version of HTTP that uses secure sockets layer/transport layer security (SSL/TLS) encryption on all transmissions so that malicious actors cannot read the information contained. HTTPS uses port 443. In the TCP/IP model, HTTPS occurs at the application layer.
- **Secure File Transfer Protocol (SFTP)** is a secure protocol used to transfer files from one device to another over a network. SFTP uses secure shell (SSH), typically through TCP port 22. SSH uses Advanced Encryption Standard (AES) and other types of encryption to ensure that unintended recipients cannot intercept the transmissions. In the TCP/IP model, SFTP occurs at the application layer. SFTP is used often with cloud storage. Every time a user uploads or downloads a file from cloud storage, the file is transferred using the SFTP protocol.

</div></div></div></div></div></div>**Note:** The encryption protocols mentioned do not conceal the source or destination IP address of network traffic. This means a malicious actor can still learn some basic information about the network traffic if they intercept it.

## Key takeaways

The protocols you learned about in this reading are basic networking protocols that entry-level cybersecurity analysts should know. Understanding how protocols function on a network is essential. Cybersecurity analysts can leverage their knowledge of protocols to successfully mitigate vulnerabilities on a network and potentially prevent future attacks.

# Additional network protocols

In previous readings and videos, you learned how network protocols organize the sending and receiving of data across a network. You also learned that protocols can be divided into three categories: communication protocols, management protocols, and security protocols.

This reading will introduce you to a few additional concepts and protocols that will come up regularly in your work as a security analyst. Some protocols are assigned port numbers by the Internet Assigned Numbers Authority (IANA). These port numbers are included in the description of each protocol, if assigned.

## Network Address Translation

The devices on your local home or office network each have a private IP address that they use to communicate directly with each other. In order for the devices with private IP addresses to communicate with the public internet, they need to have a public IP address. Otherwise, responses will not be routed correctly. Instead of having a dedicated public IP address for each of the devices on the local network, the router can replace a private source IP address with its public IP address and perform the reverse operation for responses. This process is known as Network Address Translation (NAT) and it generally requires a router or firewall to be specifically configured to perform NAT. NAT is a part of layer 2 (internet layer) and layer 3 (transport layer) of the TCP/IP model.

<div class="rc-CML" dir="auto" id="bkmrk-private-ip-addresses"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div class="css-1yr0py9"><table><thead><tr><th scope="col">**Private IP Addresses**

</th><th scope="col">**Public IP Addresses**

</th></tr></thead><tbody><tr><td>- Assigned by network admins
- Unique only within private network
- No cost to use
- Address ranges:
    
    
    - 10.0.0.0-10.255.255.255
    - 172.16.0.0-172.31.255.255
    - 192.168.0.0-192.168.255.255

</td><td>- Assigned by ISP and IANA
- Unique address in global internet
- Costs to lease a public IP address
- Address ranges:
    
    
    - 1.0.0.0-9.255.255.255
    - 11.0.0.0-126.255.255.255
    - 128.0.0.0-172.15.255.255
    - 172.32.0.0-192.167.255.255
    - 192.169.0.0-233.255.255.255

</td></tr></tbody></table>

</div></div></div></div></div></div></div>## Dynamic Host Configuration Protocol

Dynamic Host Configuration Protocol (DHCP) is in the management family of network protocols. DHCP is an application layer protocol used on a network to configure devices. It assigns a unique IP address and provides the addresses of the appropriate DNS server and default gateway for each device. DHCP servers operate on UDP port 67 while DHCP clients operate on UDP port 68.

## Address Resolution Protocol

By now, you are familiar with IP and MAC addresses. You’ve learned that each device on a network has both an IP address that identifies it on the network and a MAC address that is unique to that network interface. A device’s IP address may change over time, but its MAC address is permanent. Address Resolution Protocol (ARP) is an internet layer protocol in the TCP/IP model used to translate the IP addresses that are found in data packets into the MAC address of the hardware device.

Each device on the network performs ARP and keeps track of matching IP and MAC addresses in an ARP cache. ARP does not have a specific port number.

## Telnet 

Telnet is an application layer protocol that allows a device to communicate with another device or server. Telnet sends all information in clear text. It uses command line prompts to control another device similar to secure shell (SSH), but Telnet is not as secure as SSH. Telnet can be used to connect to local or remote devices and uses TCP port 23.

## Secure shell

Secure shell protocol (SSH) is used to create a secure connection with a remote system. This application layer protocol provides an alternative for secure authentication and encrypted communication. SSH operates over the TCP port 22 and is a replacement for less secure protocols, such as Telnet.

## Post office protocol

Post office protocol (POP) is an application layer (layer 4 of the TCP/IP model) protocol used to manage and retrieve email from a mail server. Many organizations have a dedicated mail server on the network that handles incoming and outgoing mail for users on the network. User devices will send requests to the remote mail server and download email messages locally. If you have ever refreshed your email application and had new emails populate in your inbox, you are experiencing POP and internet message access protocol (IMAP) in action. Unencrypted, plaintext authentication uses TCP/UDP port 110 and encrypted emails use Secure Sockets Layer/Transport Layer Security (SSL/TLS) over TCP/UDP port 995. When using POP, mail has to finish downloading on a local device before it can be read and it does not allow a user to sync emails.

## Internet Message Access Protocol (IMAP)

IMAP is used for incoming email. It downloads the headers of emails, but not the content. The content remains on the email server, which allows users to access their email from multiple devices. IMAP uses TCP port 143 for unencrypted email and TCP port 993 over the TLS protocol. Using IMAP allows users to partially read email before it is finished downloading and to sync emails. However, IMAP is slower than POP3.

## Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is used to transmit and route email from the sender to the recipient’s address. SMTP works with Message Transfer Agent (MTA) software, which searches DNS servers to resolve email addresses to IP addresses, to ensure emails reach their intended destination. SMTP uses TCP/UDP port 25 for unencrypted emails and TCP/UDP port 587 using TLS for encrypted emails. The TCP port 25 is often used by high-volume spam. SMTP helps to filter out spam by regulating how many emails a source can send at a time.

## Protocols and port numbers

Remember that port numbers are used by network devices to determine what should be done with the information contained in each data packet once they reach their destination. Firewalls can filter out unwanted traffic based on port numbers. For example, an organization may configure a firewall to only allow access to TCP port 995 (POP3) by IP addresses belonging to the organization.

As a security analyst, you will need to know about many of the protocols and port numbers mentioned in this course. They may be used to determine your technical knowledge in interviews, so it’s a good idea to memorize them. You will also learn about new protocols on the job in a security position.

## Key takeaways

As a cybersecurity analyst, you will encounter various common protocols in your everyday work. The protocols covered in this reading include NAT, DHCP, ARP, Telnet, SSH, POP3, IMAP, and SMTP. It is equally important to understand where each protocol is structured in the TCP/IP model and which ports they occupy.

<div class="rc-CML" dir="auto" id="bkmrk-protocol-port-dhcp-u"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div class="css-1yr0py9"><table><thead><tr><th scope="col">**Protocol**

</th><th scope="col">**Port**

</th></tr></thead><tbody><tr><td>DHCP

</td><td>UDP port 67 (servers)

UDP port 68 (clients)

</td></tr><tr><td>ARP

</td><td>none

</td></tr><tr><td>Telnet

</td><td>TCP port 23

</td></tr><tr><td>SSH

</td><td>TCP port 22

</td></tr><tr><td>POP3

</td><td>TCP/UDP port 110 (unencrypted)

TCP/UDP port 995 (encrypted, SSL/TLS)

</td></tr><tr><td>IMAP

</td><td>TCP port 143 (unencrypted)

TCP port 993 (encrypted, SSL/TLS)

</td></tr><tr><td>SMTP

</td><td>TCP/UDP port 587 (encrypted, TLS)

</td></tr></tbody></table>

</div></div></div></div></div></div></div><div class="css-rj3g7z" data-testid="reading-complete-container" id="bkmrk-"><div class="cds-1 css-1adbulh cds-2" data-testid="completed"><div class="cds-1 css-1xwg9v5 cds-3 cds-grid-item cds-10" data-testid="completed-text"><svg aria-hidden="true" class="css-duqyvt" fill="none" focusable="false" height="24" id="bkmrk--1" viewbox="0 0 24 24" width="24"></svg></div></div></div>### Co

# Antara: Working in network security

  
My name is Antara,  
I work on the Enterprise Infrastructure Protection Team at Google.  
And our main job responsibility is to protect  
the infrastructure that all the amazing Google products run on.  
I didn't start with a background in computers, and I did my undergrad  
in electronics and communication, which is far away from computers.  
I took up the challenge to actually pivot into computers with my first job.  
That actually led me to explore the security world even more.  
And that's how it led to doing my masters in security, getting expertise in that  
area and then come to Google as a security engineer.  
A typical day in the life of an entry-level network security engineer  
would start with solving a problem.  
Maybe you're trying to debug, why is this particular endpoint flooded with so  
much traffic?  
Or why is this endpoint actually slowing down?  
And you would start with, okay, let me get to the endpoint.  
Let me capture some traffic on the endpoint and  
see what kind of traffic is coming in and going out through this endpoint.  
So I would typically go back, think about the problem during lunch.  
Sometimes things would click.  
When you're thinking you might not have thought about a problem from a different  
perspective, you might want to actually see how it looks like.  
So you would go about maybe doing a lab recreate.  
Let me connect these endpoints and let me try to reproduce the issue.  
You might see some things in the lab recreate that you might have not  
thought of.  
And you might need to actually consult with experts from different domains who  
might know better about this area.  
Get their view on what the problem is, analyze,  
show them everything that you have done.  
You might get your solution just by talking to people.  
It's a pretty busy day, but it's also a very fun day.  
It's like solving puzzles all the time, which is pretty exciting.  
Some of the best practices in network security that I've learned are,  
don't try to always reinvent the wheel.  
There are certain protocols,  
there are certain algorithms that have been tried, tested,  
analyzed, and they have been deemed secure for being used in network security.  
The time that you spend on reinventing the wheel is not going to give you  
the benefits that you need.  
So it's always good to think about the unsolved challenges instead of  
trying to solve the same problem in a different way.  
I feel cybersecurity is actually a great field to get into right now, because,  
as you see, we are in this information age where tech is exponentially growing.  
Just getting into this field is just going to be exciting because there  
are amazing new challenges coming up in this field.  
  
​

# Wireless protocols, The evolution of wireless security protocols

So far, you've learned about  
a variety of network protocols,  
including communication protocols like TCP/IP.  
Now we're going to go more in depth  
into a class of communication protocols  
called the IEEE802.11.  
IEEE802.11, commonly known as Wi-Fi,  
is a set of standards that define  
communications for wireless LANs.  
IEEE stands for  
the Institute of Electrical and Electronics Engineers,  
which is an organization that maintains Wi-Fi standards,  
and 802.11 is a suite of  
protocols used in wireless communications.  
Wi-Fi protocols have adapted  
over the years to become more secure and reliable  
to provide the same level of  
security as a wired connection.  
In 2004,  
a security protocol called the Wi-Fi Protected Access,  
or WPA, was introduced.  
WPA is a wireless security protocol  
for devices to connect to the internet.  
Since then, WPA has evolved  
into newer versions, like WPA2 and WPA3,  
which include further security improvements,  
like more advanced encryption.  
As a security analyst,  
you might be responsible for making sure that  
the wireless connections in your organization are secure.  
Let's learn more about security measures.

# The evolution of wireless security protocols

In the early days of the internet, all internet communication happened across physical cables. It wasn’t until the mid-1980s that authorities in the United States designated a spectrum of radio wave frequencies that could be used without a license, so there was more opportunity for the internet to expand.

In the late 1990s and early 2000s, technologies were developed to send and receive data over radio. Today, users access wireless internet through laptops, smart phones, tablets, and desktops. Smart devices, like thermostats, door locks, and security cameras, also use wireless internet to communicate with each other and with services on the internet.

<div class="rc-CML" dir="auto" id="bkmrk-"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Wireless router with antenna connected to WEP, WPA, WPA2, and WPA3 protocols](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/xRV4czFOTUeQoV2vrMyMeg_d23346290329425da28d901333b11af1_KRMIlg0NE-hyueu8ieJBVc92c_gZAut6oOyRG0iOjP58SBeS6AojyB3piYq3ZOtOCf1kwrG62COp1ei3Uih_CcoNT2_QdtdaHyEchUsGTcmreFbywK_tUWZJGhMD3Tji9hxIUjH-yQAD8RSKpTbtJDHXD88IOpsqzlu8MCJotlno6JixxiW8pmiYFuzqHZ1bZhfT3cMFIZxI3sPnCh_BnizMW3y21VJuVZcX?expiry=1688169600000&hmac=hENnrbj08dMfqwz9YgM7vqgC7OushP-_Ag3xIZJi1is)</figure></div></div></div></div></div></div></div>## Introduction to wireless communication protocols

Many people today refer to wireless internet as Wi-Fi. **Wi-Fi** refers to a set of standards that define communication for wireless LANs. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.

Wi-Fi standards and protocols are based on the 802.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.

Wi-Fi communications are secured by wireless networking protocols. Wireless security protocols have evolved over the years, helping to identify and resolve vulnerabilities with more advanced wireless technologies.

In this reading, you will learn about the evolution of wireless security protocols from WEP to WPA, WPA2, and WPA3. You’ll also learn how the Wireless Application Protocol was used for mobile internet communications.

### **Wired Equivalent Privacy**

Wired equivalent privacy (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wired network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.

WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP encryption, so it’s now considered a high-risk security protocol.

### **Wi-Fi Protected Access**

Wi-Fi Protected Access (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so backwards compatibility could be established with older hardware.

The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses larger secret keys than WEPs, making it more difficult to guess the key by trial and error.

WPA also includes a message integrity check that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.

Despite the security improvements of WPA, it still has vulnerabilities. Malicious actors can use a key reinstallation attack (or KRACK attack) to decrypt transmissions using WPA. Attackers can insert themselves in the WPA authentication handshake process and insert a new encryption key instead of the dynamic one assigned by WPA. If they set the new key to all zeros, it is as if the transmission is not encrypted at all.

Because of this significant vulnerability, WPA was replaced with an updated version of the protocol called WPA2.

### **WPA2 &amp; WPA3**

#### **WPA2**

The second version of Wi-Fi Protected Access—known as WPA2—was released in 2004. WPA2 improves upon WPA by using the Advanced Encryption Standard (AES). WPA2 also improves upon WPA’s use of TKIP. WPA2 uses the Counter Mode Cipher Block Chain Message Authentication Code Protocol (CCMP), which provides encapsulation and ensures message authentication and integrity. Because of the strength of WPA2, it is considered the security standard for all Wi-Fi transmissions today. WPA2, like its predecessor, is vulnerable to KRACK attacks. This led to the development of WPA3 in 2018.

#### **Personal**

WPA2 personal mode is best suited for home networks for a variety of reasons. It is easy to implement, initial setup takes less time for personal than enterprise version. The global passphrase for WPA2 personal version needs to be applied to each individual computer and access point in a network. This makes it ideal for home networks, but unmanageable for organizations.

#### **Enterprise**

WPA2 enterprise mode works best for business applications. It provides the necessary security for wireless networks in business settings. The initial setup is more complicated than WPA2 personal mode, but enterprise mode offers individualized and centralized control over the Wi-Fi access to a business network. This means that network administrators can grant or remove user access to a network at any time. Users never have access to encryption keys, this prevents potential attackers from recovering network keys on individual computers.

#### **WPA3**

WPA3 is a secure Wi-Fi protocol and is growing in usage as more WPA3 compatible devices are released. These are the key differences between WPA2 and WPA3:

<div class="rc-CML" dir="auto" id="bkmrk-wpa3-addresses-the-a"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- WPA3 addresses the authentication handshake vulnerability to KRACK attacks, which is present in WPA2.
- WPA3 uses Simultaneous Authentication of Equals (SAE), a password-authenticated, cipher-key-sharing agreement. This prevents attackers from downloading data from wireless network connections to their systems to attempt to decode it.
- WPA3 has increased encryption to make passwords more secure by using 128-bit encryption, with WPA3-Enterprise mode offering optional 192-bit encryption.

</div></div></div></div></div></div>## Key takeaways

As a security analyst, knowing the history of how Wi-Fi security protocols developed helps you to better understand what to consider when protecting wireless networks. It’s important that you understand the vulnerabilities of each protocol and how important it is that devices on your network use the most up-to-date security technologies.

# Firewalls and network security measures

# Firewalls and network security measures

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-video%2C-you%27l"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this video, you'll" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this video, you'll </span></div><div aria-label="toggle video from learn about different types of firewalls." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">learn about different types of firewalls. </span></div><div aria-label="toggle video from These include hardware," class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These include hardware, </span></div><div aria-label="toggle video from software, and cloud-based firewalls." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">software, and cloud-based firewalls. </span></div><div aria-label="toggle video from You'll also learn the difference between" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You'll also learn the difference between </span></div><div aria-label="toggle video from a stateless and stateful firewall and" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a stateless and stateful firewall and </span></div><div aria-label="toggle video from cover some of the basic operations" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cover some of the basic operations </span></div><div aria-label="toggle video from that a firewall performs." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that a firewall performs. </span></div><div aria-label="toggle video from current lecture segment: Finally, you will explore how" class="rc-Phrase active css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, you will explore how </span></div><div aria-label="toggle video from proxy servers are used to" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">proxy servers are used to </span></div><div aria-label="toggle video from add a layer of security to the network." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">add a layer of security to the network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-firewall-is-a-netw"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A firewall is a network security device that" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A firewall is a network security device that </span></div><div aria-label="toggle video from monitors traffic to and from your network." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">monitors traffic to and from your network. </span></div><div aria-label="toggle video from It either allows traffic or it blocks" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It either allows traffic or it blocks </span></div><div aria-label="toggle video from it based on a defined set of security rules." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it based on a defined set of security rules. </span></div><div aria-label="toggle video from A firewall can use port filtering," class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A firewall can use port filtering, </span></div><div aria-label="toggle video from which blocks or allows" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which blocks or allows </span></div><div aria-label="toggle video from certain port numbers to limit unwanted communication." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">certain port numbers to limit unwanted communication. </span></div><div aria-label="toggle video from For example, it could have a rule" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, it could have a rule </span></div><div aria-label="toggle video from that only allows communications on port" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that only allows communications on port </span></div><div aria-label="toggle video from 443 for HTTPS or port" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">443 for HTTPS or port </span></div><div aria-label="toggle video from 25 for email and blocks everything else." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">25 for email and blocks everything else. </span></div><div aria-label="toggle video from These firewall settings will be determined by" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These firewall settings will be determined by </span></div><div aria-label="toggle video from the organization's security policy." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization's security policy. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-talk-about-a-f"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's talk about a few different kinds of firewalls." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's talk about a few different kinds of firewalls. </span></div><div aria-label="toggle video from A hardware firewall is considered the most" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A hardware firewall is considered the most </span></div><div aria-label="toggle video from basic way to defend against threats to a network." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">basic way to defend against threats to a network. </span></div><div aria-label="toggle video from A hardware firewall inspects" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A hardware firewall inspects </span></div><div aria-label="toggle video from each data packet before it's" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">each data packet before it's </span></div><div aria-label="toggle video from allowed to enter the network." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allowed to enter the network. </span></div><div aria-label="toggle video from A software firewall performs" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A software firewall performs </span></div><div aria-label="toggle video from the same functions as a hardware firewall," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the same functions as a hardware firewall, </span></div><div aria-label="toggle video from but it's not a physical device." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but it's not a physical device. </span></div><div aria-label="toggle video from Instead, it's a software program" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Instead, it's a software program </span></div><div aria-label="toggle video from installed on a computer or on a server." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">installed on a computer or on a server. </span></div><div aria-label="toggle video from If the software firewall is installed on a computer," class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If the software firewall is installed on a computer, </span></div><div aria-label="toggle video from it will analyze all the traffic" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it will analyze all the traffic </span></div><div aria-label="toggle video from received by that computer." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">received by that computer. </span></div><div aria-label="toggle video from If the software firewall is installed on a server," class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If the software firewall is installed on a server, </span></div><div aria-label="toggle video from it will protect all the devices connected to the server." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it will protect all the devices connected to the server. </span></div><div aria-label="toggle video from A software firewall typically costs" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A software firewall typically costs </span></div><div aria-label="toggle video from less than purchasing a separate physical device," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">less than purchasing a separate physical device, </span></div><div aria-label="toggle video from and it doesn't take up any extra space." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and it doesn't take up any extra space. </span></div><div aria-label="toggle video from But because it is a software program," class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But because it is a software program, </span></div><div aria-label="toggle video from it will add some processing burden" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it will add some processing burden </span></div><div aria-label="toggle video from to the individual devices." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to the individual devices. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-organizations-may-ch"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Organizations may choose to use a cloud-based firewall." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Organizations may choose to use a cloud-based firewall. </span></div><div aria-label="toggle video from Cloud service providers offer firewalls as" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Cloud service providers offer firewalls as </span></div><div aria-label="toggle video from a service, or FaaS, for organizations." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a service, or FaaS, for organizations. </span></div><div aria-label="toggle video from Cloud-based firewalls are software firewalls" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Cloud-based firewalls are software firewalls </span></div><div aria-label="toggle video from hosted by a cloud service provider." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">hosted by a cloud service provider. </span></div><div aria-label="toggle video from Organizations can configure the firewall rules" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Organizations can configure the firewall rules </span></div><div aria-label="toggle video from on the cloud service provider's interface," class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on the cloud service provider's interface, </span></div><div aria-label="toggle video from and the firewall will perform security operations on" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the firewall will perform security operations on </span></div><div aria-label="toggle video from all incoming traffic before" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all incoming traffic before </span></div><div aria-label="toggle video from it reaches the organization’s onsite network." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it reaches the organization’s onsite network. </span></div><div aria-label="toggle video from Cloud-based firewalls also protect any assets or" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Cloud-based firewalls also protect any assets or </span></div><div aria-label="toggle video from processes that an organization" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">processes that an organization </span></div><div aria-label="toggle video from might be using in the cloud." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">might be using in the cloud. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-all-the-firewalls-we"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from All the firewalls we have discussed can be" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All the firewalls we have discussed can be </span></div><div aria-label="toggle video from either stateful or stateless." class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">either stateful or stateless. </span></div><div aria-label="toggle video from The terms "stateful" and "stateless"" class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The terms "stateful" and "stateless" </span></div><div aria-label="toggle video from refer to how the firewall operates." class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">refer to how the firewall operates. </span></div><div aria-label="toggle video from Stateful refers to a class" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Stateful refers to a class </span></div><div aria-label="toggle video from of firewall that keeps track of" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of firewall that keeps track of </span></div><div aria-label="toggle video from information passing through it" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">information passing through it </span></div><div aria-label="toggle video from and proactively filters out threats." class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and proactively filters out threats. </span></div><div aria-label="toggle video from A stateful firewall analyzes" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A stateful firewall analyzes </span></div><div aria-label="toggle video from network traffic for characteristics and" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network traffic for characteristics and </span></div><div aria-label="toggle video from behavior that appear suspicious" class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">behavior that appear suspicious </span></div><div aria-label="toggle video from and stops them from entering the network." class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and stops them from entering the network. </span></div><div aria-label="toggle video from Stateless refers to a class" class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Stateless refers to a class </span></div><div aria-label="toggle video from of firewall that operates based on" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of firewall that operates based on </span></div><div aria-label="toggle video from predefined rules and does not" class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">predefined rules and does not </span></div><div aria-label="toggle video from keep track of information from data packets." class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">keep track of information from data packets. </span></div><div aria-label="toggle video from A stateless firewall only acts according to" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A stateless firewall only acts according to </span></div><div aria-label="toggle video from preconfigured rules set by the firewall administrator." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">preconfigured rules set by the firewall administrator. </span></div><div aria-label="toggle video from The rules programmed by the firewall administrator tell" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The rules programmed by the firewall administrator tell </span></div><div aria-label="toggle video from the device what to accept and what to reject." class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the device what to accept and what to reject. </span></div><div aria-label="toggle video from A stateless firewall doesn't store analyzed information." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A stateless firewall doesn't store analyzed information. </span></div><div aria-label="toggle video from It also doesn't discover" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It also doesn't discover </span></div><div aria-label="toggle video from suspicious trends like a stateful firewall does." class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">suspicious trends like a stateful firewall does. </span></div><div aria-label="toggle video from For this reason, stateless firewalls are considered" class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For this reason, stateless firewalls are considered </span></div><div aria-label="toggle video from less secure than stateful firewalls." class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">less secure than stateful firewalls. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-next-generation-fi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A next generation firewall, or NGFW," class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A next generation firewall, or NGFW, </span></div><div aria-label="toggle video from provides even more security than a stateful firewall." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">provides even more security than a stateful firewall. </span></div><div aria-label="toggle video from Not only does an NGFW provide" class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Not only does an NGFW provide </span></div><div aria-label="toggle video from stateful inspection of incoming and outgoing traffic," class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">stateful inspection of incoming and outgoing traffic, </span></div><div aria-label="toggle video from but it also performs more" class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but it also performs more </span></div><div aria-label="toggle video from in-depth security functions like" class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in-depth security functions like </span></div><div aria-label="toggle video from deep packet inspection and intrusion protection." class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">deep packet inspection and intrusion protection. </span></div><div aria-label="toggle video from Some NGFWs connect to" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some NGFWs connect to </span></div><div aria-label="toggle video from cloud-based threat intelligence services" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cloud-based threat intelligence services </span></div><div aria-label="toggle video from so they can quickly update to" class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so they can quickly update to </span></div><div aria-label="toggle video from protect against emerging cyber threats." class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protect against emerging cyber threats. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--5"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now-you-have-a-basic"><div aria-label="toggle video from Now you have a basic understanding" class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now you have a basic understanding </span></div><div aria-label="toggle video from of firewalls and how they work." class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of firewalls and how they work. </span></div><div aria-label="toggle video from We learned that firewalls can be hardware or software." class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We learned that firewalls can be hardware or software. </span></div><div aria-label="toggle video from We also discussed the difference between" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We also discussed the difference between </span></div><div aria-label="toggle video from a stateless and stateful firewall" class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a stateless and stateful firewall </span></div><div aria-label="toggle video from and the security benefits of a stateful firewall." class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the security benefits of a stateful firewall. </span></div><div aria-label="toggle video from Finally, we discussed next generation firewalls" class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, we discussed next generation firewalls </span></div><div aria-label="toggle video from and the security benefits they provide." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the security benefits they provide. </span></div><div aria-label="toggle video from Coming up, we'll learn more about virtual networks." class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll learn more about virtual networks. </span></div></div>

# Virtual private networks (VPNs)

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-video%2C-we%27re"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this video, we're going to" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this video, we're going to </span></div><div aria-label="toggle video from discuss how virtual private networks," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss how virtual private networks, </span></div><div aria-label="toggle video from or VPNs, add security to your network." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or VPNs, add security to your network. </span></div><div aria-label="toggle video from When you connect to the internet," class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When you connect to the internet, </span></div><div aria-label="toggle video from your internet service provider receives" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your internet service provider receives </span></div><div aria-label="toggle video from your network's requests and" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your network's requests and </span></div><div aria-label="toggle video from forwards it to the correct destination server." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">forwards it to the correct destination server. </span></div><div aria-label="toggle video from But your internet requests" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But your internet requests </span></div><div aria-label="toggle video from include your private information." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">include your private information. </span></div><div aria-label="toggle video from That means if the traffic gets intercepted," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That means if the traffic gets intercepted, </span></div><div aria-label="toggle video from someone could potentially connect your internet activity" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">someone could potentially connect your internet activity </span></div><div aria-label="toggle video from with your physical location" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with your physical location </span></div><div aria-label="toggle video from and your personal information." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and your personal information. </span></div><div aria-label="toggle video from This includes some information" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This includes some information </span></div><div aria-label="toggle video from that you want to keep private," class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that you want to keep private, </span></div><div aria-label="toggle video from like bank accounts and credit card numbers." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like bank accounts and credit card numbers. </span></div><div aria-label="toggle video from A virtual private network," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A virtual private network, </span></div><div aria-label="toggle video from also known as a VPN," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also known as a VPN, </span></div><div aria-label="toggle video from is a network security service that changes" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is a network security service that changes </span></div><div aria-label="toggle video from your public IP address and hides" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your public IP address and hides </span></div><div aria-label="toggle video from your virtual location so that you can keep your data" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your virtual location so that you can keep your data </span></div><div aria-label="toggle video from private when you're using a public" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">private when you're using a public </span></div><div aria-label="toggle video from network like the internet." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network like the internet. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-vpns-also-encrypt-yo"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from VPNs also encrypt your data as it" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">VPNs also encrypt your data as it </span></div><div aria-label="toggle video from travels across the internet to preserve confidentiality." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">travels across the internet to preserve confidentiality. </span></div><div aria-label="toggle video from A VPN service performs" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A VPN service performs </span></div><div aria-label="toggle video from encapsulation on your data in transit." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encapsulation on your data in transit. </span></div><div aria-label="toggle video from Encapsulation is a process performed" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Encapsulation is a process performed </span></div><div aria-label="toggle video from by a VPN service that protects" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by a VPN service that protects </span></div><div aria-label="toggle video from your data by wrapping" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your data by wrapping </span></div><div aria-label="toggle video from sensitive data in other data packets." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">sensitive data in other data packets. </span></div><div aria-label="toggle video from Previously, you learned how the MAC and IP address of" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, you learned how the MAC and IP address of </span></div><div aria-label="toggle video from the destination device is contained" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the destination device is contained </span></div><div aria-label="toggle video from in the header and footer of a data packet." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in the header and footer of a data packet. </span></div><div aria-label="toggle video from This is a security threat because it shows" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is a security threat because it shows </span></div><div aria-label="toggle video from the IP and virtual location of your private network." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the IP and virtual location of your private network. </span></div><div aria-label="toggle video from You could secure a data packet by encrypting" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You could secure a data packet by encrypting </span></div><div aria-label="toggle video from it to make sure your information can't be deciphered," class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it to make sure your information can't be deciphered, </span></div><div aria-label="toggle video from but then network routers won't be able to read" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but then network routers won't be able to read </span></div><div aria-label="toggle video from the IP and MAC address to know where to send it to." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the IP and MAC address to know where to send it to. </span></div><div aria-label="toggle video from This means you won't be able to connect to" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This means you won't be able to connect to </span></div><div aria-label="toggle video from the internet site or the service that you want." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internet site or the service that you want. </span></div><div aria-label="toggle video from Encapsulation solves this problem" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Encapsulation solves this problem </span></div><div aria-label="toggle video from while still maintaining your privacy." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">while still maintaining your privacy. </span></div><div aria-label="toggle video from VPN services encrypt your data packets and" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">VPN services encrypt your data packets and </span></div><div aria-label="toggle video from encapsulate them in other data packets" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encapsulate them in other data packets </span></div><div aria-label="toggle video from that the routers can read." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that the routers can read. </span></div><div aria-label="toggle video from This allows your network requests" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This allows your network requests </span></div><div aria-label="toggle video from to reach their destination," class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to reach their destination, </span></div><div aria-label="toggle video from but still encrypts your personal data" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but still encrypts your personal data </span></div><div aria-label="toggle video from so it's unreadable while in transit." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so it's unreadable while in transit. </span></div><div aria-label="toggle video from A VPN also uses an encrypted tunnel" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A VPN also uses an encrypted tunnel </span></div><div aria-label="toggle video from between your device and the VPN server." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">between your device and the VPN server. </span></div><div aria-label="toggle video from The encryption is unhackable without a cryptographic key," class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The encryption is unhackable without a cryptographic key, </span></div><div aria-label="toggle video from so no one can access your data." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so no one can access your data. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-vpn-services-are-sim"><div aria-label="toggle video from VPN services are simple and offer" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">VPN services are simple and offer </span></div><div aria-label="toggle video from significant protection while you're on the internet." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">significant protection while you're on the internet. </span></div><div aria-label="toggle video from With a VPN," class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">With a VPN, </span></div><div aria-label="toggle video from you have the added assurance that your data is encrypted, and" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you have the added assurance that your data is encrypted, and </span></div><div aria-label="toggle video from your IP address and" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your IP address and </span></div><div aria-label="toggle video from current lecture segment: virtual location are unreadable to malicious actors." class="rc-Phrase active css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">virtual location are unreadable to malicious actors. </span></div></div>

# Security zones

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-section%2C-we%27"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this section, we'll discuss a type of" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this section, we'll discuss a type of </span></div><div aria-label="toggle video from network security feature called a security zone." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network security feature called a security zone. </span></div><div aria-label="toggle video from Security zones are a segment of a network" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones are a segment of a network </span></div><div aria-label="toggle video from that protects the internal network from the internet." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that protects the internal network from the internet. </span></div><div aria-label="toggle video from They are a part of a security technique" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They are a part of a security technique </span></div><div aria-label="toggle video from called network segmentation" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">called network segmentation </span></div><div aria-label="toggle video from that divides the network into segments." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that divides the network into segments. </span></div><div aria-label="toggle video from Each network segment has" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Each network segment has </span></div><div aria-label="toggle video from its own access permissions and security rules." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">its own access permissions and security rules. </span></div><div aria-label="toggle video from Security zones control who can" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones control who can </span></div><div aria-label="toggle video from access different segments of a network." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">access different segments of a network. </span></div><div aria-label="toggle video from Security zones act as a barrier to internal networks," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones act as a barrier to internal networks, </span></div><div aria-label="toggle video from maintain privacy within corporate groups," class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maintain privacy within corporate groups, </span></div><div aria-label="toggle video from and prevent issues from spreading to the whole network." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and prevent issues from spreading to the whole network. </span></div><div aria-label="toggle video from One example of network segmentation is" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One example of network segmentation is </span></div><div aria-label="toggle video from current lecture segment: a hotel that offers free public Wi-Fi." class="rc-Phrase active css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a hotel that offers free public Wi-Fi. </span></div><div aria-label="toggle video from The unsecured guest network is kept separate from" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The unsecured guest network is kept separate from </span></div><div aria-label="toggle video from another encrypted network used by the hotel staff." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another encrypted network used by the hotel staff. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-additionally%2C-an-org"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Additionally, an organization's" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Additionally, an organization's </span></div><div aria-label="toggle video from network can be divided into" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network can be divided into </span></div><div aria-label="toggle video from subnetworks, or subnets, to" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">subnetworks, or subnets, to </span></div><div aria-label="toggle video from maintain privacy for each department in a organization." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maintain privacy for each department in a organization. </span></div><div aria-label="toggle video from For instance, at a university," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For instance, at a university, </span></div><div aria-label="toggle video from there may be a faculty subnet" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">there may be a faculty subnet </span></div><div aria-label="toggle video from and a separate students subnet." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and a separate students subnet. </span></div><div aria-label="toggle video from If there is contamination on the student's subnet," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If there is contamination on the student's subnet, </span></div><div aria-label="toggle video from network administrators can isolate it and" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network administrators can isolate it and </span></div><div aria-label="toggle video from keep the rest of the network free from contamination." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">keep the rest of the network free from contamination. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-an-organization%27s-ne"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from An organization's network is classified into" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An organization's network is classified into </span></div><div aria-label="toggle video from two types of security zones. First," class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two types of security zones. First, </span></div><div aria-label="toggle video from there's the uncontrolled zone," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">there's the uncontrolled zone, </span></div><div aria-label="toggle video from which is any network outside of" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is any network outside of </span></div><div aria-label="toggle video from the organization's control, like the internet." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization's control, like the internet. </span></div><div aria-label="toggle video from Then, there's the controlled zone," class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, there's the controlled zone, </span></div><div aria-label="toggle video from which is a subnet that protects" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is a subnet that protects </span></div><div aria-label="toggle video from the internal network from the uncontrolled zone." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internal network from the uncontrolled zone. </span></div><div aria-label="toggle video from There are several types of" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are several types of </span></div><div aria-label="toggle video from networks within the controlled zone." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">networks within the controlled zone. </span></div><div aria-label="toggle video from On the outer layer is the demilitarized zone," class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">On the outer layer is the demilitarized zone, </span></div><div aria-label="toggle video from or DMZ, which contains" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or DMZ, which contains </span></div><div aria-label="toggle video from public-facing services that can access the internet." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">public-facing services that can access the internet. </span></div><div aria-label="toggle video from This includes web servers," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This includes web servers, </span></div><div aria-label="toggle video from proxy servers that host websites for the public," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">proxy servers that host websites for the public, </span></div><div aria-label="toggle video from and DNS servers that provide" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and DNS servers that provide </span></div><div aria-label="toggle video from IP addresses for internet users." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">IP addresses for internet users. </span></div><div aria-label="toggle video from It also includes email and file" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It also includes email and file </span></div><div aria-label="toggle video from servers that handle external communications." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">servers that handle external communications. </span></div><div aria-label="toggle video from The DMZ acts as" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The DMZ acts as </span></div><div aria-label="toggle video from a network perimeter to the internal network." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network perimeter to the internal network. </span></div><div aria-label="toggle video from The internal network contains private servers and" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The internal network contains private servers and </span></div><div aria-label="toggle video from data that the organization needs to protect." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data that the organization needs to protect. </span></div><div aria-label="toggle video from Inside the internal network is" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Inside the internal network is </span></div><div aria-label="toggle video from another zone called the restricted zone." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another zone called the restricted zone. </span></div><div aria-label="toggle video from The restricted zone protects" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The restricted zone protects </span></div><div aria-label="toggle video from highly confidential information that is only" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">highly confidential information that is only </span></div><div aria-label="toggle video from accessible to employees with certain privileges." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">accessible to employees with certain privileges. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now%2C-let%27s-try-to-pi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now, let's try to picture these security zones." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, let's try to picture these security zones. </span></div><div aria-label="toggle video from Ideally, the DMZ is situated between" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Ideally, the DMZ is situated between </span></div><div aria-label="toggle video from two firewalls. One of them" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two firewalls. One of them </span></div><div aria-label="toggle video from filters traffic outside the DMZ," class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">filters traffic outside the DMZ, </span></div><div aria-label="toggle video from and one of them filters traffic" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and one of them filters traffic </span></div><div aria-label="toggle video from entering the internal network." class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">entering the internal network. </span></div><div aria-label="toggle video from This protects the internal network" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This protects the internal network </span></div><div aria-label="toggle video from with several lines of defense." class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with several lines of defense. </span></div><div aria-label="toggle video from If there's a restricted zone," class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If there's a restricted zone, </span></div><div aria-label="toggle video from that too would be protected with" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that too would be protected with </span></div><div aria-label="toggle video from another firewall. This way," class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another firewall. This way, </span></div><div aria-label="toggle video from attacks that penetrate into" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attacks that penetrate into </span></div><div aria-label="toggle video from the DMZ network cannot spread to the internal network," class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the DMZ network cannot spread to the internal network, </span></div><div aria-label="toggle video from and attacks that penetrate" class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and attacks that penetrate </span></div><div aria-label="toggle video from the internal network cannot access the restricted zone." class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internal network cannot access the restricted zone. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, </span></div><div aria-label="toggle video from you may be responsible for regulating" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you may be responsible for regulating </span></div><div aria-label="toggle video from access control policies on these firewalls." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">access control policies on these firewalls. </span></div><div aria-label="toggle video from Security teams can control traffic reaching" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security teams can control traffic reaching </span></div><div aria-label="toggle video from the DMZ and the internal network" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the DMZ and the internal network </span></div><div aria-label="toggle video from by restricting IPs and ports." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by restricting IPs and ports. </span></div><div aria-label="toggle video from For example, an analyst may ensure that" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, an analyst may ensure that </span></div><div aria-label="toggle video from only HTTPS traffic is" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">only HTTPS traffic is </span></div><div aria-label="toggle video from allowed to access web servers in the DMZ." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allowed to access web servers in the DMZ. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-security-zones-are-a"><div aria-label="toggle video from Security zones are" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security zones are </span></div><div aria-label="toggle video from an important part of securing networks," class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an important part of securing networks, </span></div><div aria-label="toggle video from especially in large organizations." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">especially in large organizations. </span></div><div aria-label="toggle video from Understanding how they are used is" class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Understanding how they are used is </span></div><div aria-label="toggle video from essential for all security analysts." class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential for all security analysts. </span></div><div aria-label="toggle video from Coming up, we'll learn about securing internal networks." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll learn about securing internal networks. </span></div></div>

# Subnetting and CIDR

Earlier in this course, you learned about network segmentation, a security technique that divides networks into sections. A private network can be segmented to protect portions of the network from the internet, which is an unsecured global network.

For example, you learned about the uncontrolled zone, the controlled zone, the demilitarized zone, and the restricted zone. Feel free to review the video about [security zones<svg aria-labelledby="cds-react-aria-661-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/GccYm/security-zones)

for a refresher on how network segmentation can be used to add a layer of security to your organization’s network operations. Creating security zones is one example of a networking strategy called subnetting.

## Overview of subnetting

**Subnetting** is the subdivision of a network into logical groups called subnets. It works like a network inside a network. Subnetting divides up a network address range into smaller subnets within the network. These smaller subnets form based on the IP addresses and network mask of the devices on the network. Subnetting creates a network of devices to function as their own network. This makes the network more efficient and can also be used to create security zones. If devices on the same subnet communicate with each other, the switch changes the transmissions to stay on the same subnet, improving speed and efficiency of the communications.

<div id="bkmrk--1"><figure contenteditable="false" role="figure">![Two subnets for two networks connected to one router.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/vzbgwk8-RoCJ8Ppet89raA_1a225a330b8b4eaeb4a2b8bc5baaaef1_qvNCswL7ECbUiKTyL6rjp35BTSD-bbfoAoajmAyy4hHvmBJwwr22RU8T5aGDunmwKb1kvZ5TneMbG-nngVlkPXF6W-BTMap_a6XP-kAy5jgW13XvT5OTSCmI7U9YVNX4JzC1qn-zCkiZSXhbKjm2zq7SESzmANYH17_p4jub1mNikwElbJZECK0VuM_4Yrwljgfgdx2VpNad7gx2lFHMiu01wfeRKp-sjRa_kQ?expiry=1688169600000&hmac=P7eoUC0lmccZnEt0ygyr_SqgSwYImp3-f7vPw-87vyg)</figure></div>## Classless Inter-Domain Routing notation for subnetting

Classless Inter-Domain Routing (CIDR) is a method of assigning subnet masks to IP addresses to create a subnet. Classless addressing replaces classful addressing. Classful addressing was used in the 1980s as a system of grouping IP addresses into classes (Class A to Class E). Each class included a limited number of IP addresses, which were depleted as the number of devices connecting to the internet outgrew the classful range in the 1990s. Classless CIDR addressing expanded the number of available IPv4 addresses.

CIDR allows cybersecurity professionals to segment classful networks into smaller chunks. CIDR IP addresses are formatted like IPv4 addresses, but they include a slash (“/’”) followed by a number at the end of the address, This extra number is called the IP network prefix. For example, a regular IPv4 address uses the 198.51.100.0 format, whereas a CIDR IP address would include the IP network prefix at the end of the address, 198.51.100.0/24. This CIDR address encompasses all IP addresses between 198.51.100.0 and 198.51.100.255. The system of CIDR addressing reduces the number of entries in routing tables and provides more available IP addresses within networks. You can try converting CIDR to IPv4 addresses and vice versa through an online conversion tool, like [IPAddressGuide<svg aria-labelledby="cds-react-aria-662-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipaddressguide.com/cidr)

, for practice and to better understand this concept.

**Note:** You may learn more about CIDR during your career, but it won't be covered in any additional depth in this certificate program. For now, you only need a basic understanding of this concept.

## Security benefits of subnetting

Subnetting allows network professionals and analysts to create a network within their own network without requesting another network IP address from their internet service provider. This process uses network bandwidth more efficiently and improves network performance. Subnetting is one component of creating isolated subnetworks through physical isolation, routing configuration, and firewalls.

## Key takeaways

Subnetting is a common security strategy used by organizations. Subnetting allows organizations to create smaller networks within their private network. This improves the efficiency of the network and can be used to create security zones.

# Proxy servers

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-previously%2C-we-discu"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Previously, we discussed how firewalls, VPNs, and" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, we discussed how firewalls, VPNs, and </span></div><div aria-label="toggle video from security zones help to secure networks." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security zones help to secure networks. </span></div><div aria-label="toggle video from current lecture segment: Next, we'll cover how to secure internal networks with proxy servers." class="rc-Phrase active css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, we'll cover how to secure internal networks with proxy servers. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-proxy-servers-are-an"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Proxy servers are another system that helps secure networks." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Proxy servers are another system that helps secure networks. </span></div><div aria-label="toggle video from The definition of a proxy server is a server that fulfills the request of" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The definition of a proxy server is a server that fulfills the request of </span></div><div aria-label="toggle video from a client by forwarding them on to other servers." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a client by forwarding them on to other servers. </span></div><div aria-label="toggle video from The proxy server is a dedicated server that sits between the internet and" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The proxy server is a dedicated server that sits between the internet and </span></div><div aria-label="toggle video from the rest of the network." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the rest of the network. </span></div><div aria-label="toggle video from When a request to connect to the network comes in from the internet," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When a request to connect to the network comes in from the internet, </span></div><div aria-label="toggle video from the proxy server will determine if the connection request is safe." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the proxy server will determine if the connection request is safe. </span></div><div aria-label="toggle video from The proxy server is a public IP address that is different from the rest" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The proxy server is a public IP address that is different from the rest </span></div><div aria-label="toggle video from of the private network." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of the private network. </span></div><div aria-label="toggle video from This hides the private network's IP address from malicious actors on the internet and" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This hides the private network's IP address from malicious actors on the internet and </span></div><div aria-label="toggle video from adds a layer of security." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">adds a layer of security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-examine-how-th"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's examine how this will work with an example." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's examine how this will work with an example. </span></div><div aria-label="toggle video from When a client receives an HTTPS response, they will notice a distorted IP address or" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When a client receives an HTTPS response, they will notice a distorted IP address or </span></div><div aria-label="toggle video from no IP address rather than the real IP address of the organization's web server." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">no IP address rather than the real IP address of the organization's web server. </span></div><div aria-label="toggle video from A proxy server can also be used to block unsafe websites that users aren't allowed" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A proxy server can also be used to block unsafe websites that users aren't allowed </span></div><div aria-label="toggle video from to access on an organization's network." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to access on an organization's network. </span></div><div aria-label="toggle video from A proxy server uses temporary memory to store data that's" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A proxy server uses temporary memory to store data that's </span></div><div aria-label="toggle video from regularly requested by external servers." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">regularly requested by external servers. </span></div><div aria-label="toggle video from This way, it doesn't have to fetch data from an organization's internal" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This way, it doesn't have to fetch data from an organization's internal </span></div><div aria-label="toggle video from servers every time." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">servers every time. </span></div><div aria-label="toggle video from This enhances security by reducing contact with the internal server." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This enhances security by reducing contact with the internal server. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-there-are-different-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from There are different types of proxy servers that support network security." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are different types of proxy servers that support network security. </span></div><div aria-label="toggle video from This is important for security analysts who monitor" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is important for security analysts who monitor </span></div><div aria-label="toggle video from traffic from various proxy servers and may need to know what purpose they serve." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">traffic from various proxy servers and may need to know what purpose they serve. </span></div><div aria-label="toggle video from Let's explore some different types of proxy servers." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's explore some different types of proxy servers. </span></div><div aria-label="toggle video from A forward proxy server regulates and" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A forward proxy server regulates and </span></div><div aria-label="toggle video from restricts a person with access to the internet." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">restricts a person with access to the internet. </span></div><div aria-label="toggle video from The goal is to hide a user's IP address and approve all outgoing requests." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal is to hide a user's IP address and approve all outgoing requests. </span></div><div aria-label="toggle video from In the context of an organization," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In the context of an organization, </span></div><div aria-label="toggle video from a forward proxy server receives outgoing traffic from an employee, approves it, and" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a forward proxy server receives outgoing traffic from an employee, approves it, and </span></div><div aria-label="toggle video from then forwards it on to the destination on the internet." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then forwards it on to the destination on the internet. </span></div><div aria-label="toggle video from A reverse proxy server regulates and" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A reverse proxy server regulates and </span></div><div aria-label="toggle video from restricts the internet access to an internal server." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">restricts the internet access to an internal server. </span></div><div aria-label="toggle video from The goal is to accept traffic from external parties, approve it, and" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal is to accept traffic from external parties, approve it, and </span></div><div aria-label="toggle video from forward it to the internal servers." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">forward it to the internal servers. </span></div><div aria-label="toggle video from This setup is useful for protecting internal web servers containing" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This setup is useful for protecting internal web servers containing </span></div><div aria-label="toggle video from confidential data from exposing their IP address to external parties." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">confidential data from exposing their IP address to external parties. </span></div><div aria-label="toggle video from An email proxy server is another valuable security tool." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An email proxy server is another valuable security tool. </span></div><div aria-label="toggle video from It filters spam email by verifying whether a sender's address was forged." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It filters spam email by verifying whether a sender's address was forged. </span></div><div aria-label="toggle video from This reduces the risk of phishing attacks that impersonate people known to" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This reduces the risk of phishing attacks that impersonate people known to </span></div><div aria-label="toggle video from the organization." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-talk-about-a-r"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's talk about a real world example of an email proxy." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's talk about a real world example of an email proxy. </span></div><div aria-label="toggle video from Several years ago when I was working at a large U.S. broadband ISP," class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Several years ago when I was working at a large U.S. broadband ISP, </span></div><div aria-label="toggle video from we used a proxy server to implement multiple layers of anti-spam filtering" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we used a proxy server to implement multiple layers of anti-spam filtering </span></div><div aria-label="toggle video from before a message was allowed in for delivery." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">before a message was allowed in for delivery. </span></div><div aria-label="toggle video from It ended up tagging around 95% of messages as spam." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It ended up tagging around 95% of messages as spam. </span></div><div aria-label="toggle video from The proxy servers would've allowed us to filter and" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The proxy servers would've allowed us to filter and </span></div><div aria-label="toggle video from then scale those filters without impacting the underlying email platform." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then scale those filters without impacting the underlying email platform. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-proxy-servers-play-a"><div aria-label="toggle video from Proxy servers play an important part in network security by filtering incoming and" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Proxy servers play an important part in network security by filtering incoming and </span></div><div aria-label="toggle video from outgoing traffic and staying alert to network attacks." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">outgoing traffic and staying alert to network attacks. </span></div><div aria-label="toggle video from These devices add a layer of protection from the unsecured public network that we call" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These devices add a layer of protection from the unsecured public network that we call </span></div><div aria-label="toggle video from the internet." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the internet. </span></div></div>

# Virtual networks and privacy

This section of the course covered a lot of information about network operations. You reviewed the fundamentals of network architecture and communication and can now use this knowledge as you learn how to secure networks. Securing a private network requires maintaining the confidentiality of your data and restricting access to authorized users.

In this reading, you will review several network security topics previously covered in the course, including virtual private networks (VPNs), virtual local area networks (VLANs), proxy servers, firewalls, tunneling, and security zones. You'll continue to learn more about these concepts and how they relate to each other as you continue through the course.

## **Common network protocols** 

Network protocols are used to direct traffic to the correct device and service depending on the kind of communication being performed by the devices on the network. Protocols are the rules used by all network devices that provide a mutually agreed upon foundation for how to transfer data across a network.

There are three main categories of network protocols: communication protocols, management protocols, and security protocols.

<div class="rc-CML" dir="auto" id="bkmrk-communication-protoc"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">1. Communication protocols are used to establish connections between servers. Examples include TCP, UDP, and Simple Mail Transfer Protocol (SMTP), which provides a framework for email communication.
2. Management protocols are used to troubleshoot network issues. One example is the Internet Control Message Protocol (ICMP).
3. Security protocols provide encryption for data in transit. Examples include IPSec and SSL/TLS.

</div></div></div></div></div></div>Some other commonly used protocols are:

<div class="rc-CML" dir="auto" id="bkmrk-hypertext-transfer-p"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- HyperText Transfer Protocol (HTTP). HTTP is an application layer communication protocol. This allows the browser and the web server to communicate with one another.
- Domain Name System (DNS). DNS is an application layer protocol that translates, or maps, host names to IP addresses.
- Address Resolution Protocol (ARP). ARP is a network layer communication protocol that maps IP addresses to physical machines or a MAC address recognized on the local area network.

</div></div></div></div></div></div>## **Wi-Fi**

This section of the course also introduced various wireless security protocols, including WEP, WPA, WPA2, and WPA3. WPA3 encrypts traffic with the Advanced Encryption Standard (AES) cipher as it travels from your device to the wireless access point. WPA2 and WPA3 offer two modes: personal and enterprise. Personal mode is best suited for home networks while enterprise mode is generally utilized for business networks and applications.

## **Network security tools and practices** 

### **Firewalls** 

Previously, you learned that firewalls are network virtual appliances (NVAs) or hardware devices that inspect and can filter network traffic before it’s permitted to enter the private network. Traditional firewalls are configured with rules that tell it what types of data packets are allowed based on the port number and IP address of the data packet.

There are two main categories of firewalls.

<div class="rc-CML" dir="auto" id="bkmrk-stateless%3A-a-class-o"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Stateless:** A class of firewall that operates based on predefined rules and does not keep track of information from data packets
- **Stateful:** A class of firewall that keeps track of information passing through it and proactively filters out threats. Unlike stateless firewalls, which require rules to be configured in two directions, a stateful firewall only requires a rule in one direction. This is because it uses a "state table" to track connections, so it can match return traffic to an existing session

</div></div></div></div></div></div>Next generation firewalls (NGFWs) are the most technologically advanced firewall protection. They exceed the security offered by stateful firewalls because they include deep packet inspection (a kind of packet sniffing that examines data packets and takes actions if threats exist) and intrusion prevention features that detect security threats and notify firewall administrators. NGFWs can inspect traffic at the application layer of the TCP/IP model and are typically application aware. Unlike traditional firewalls that block traffic based on IP address and ports, NGFWs rules can be configured to block or allow traffic based on the application. Some NGFWs have additional features like Malware Sandboxing, Network Anti-Virus, and URL and DNS Filtering.

### **Proxy servers** 

A proxy server is another way to add security to your private network. Proxy servers utilize network address translation (NAT) to serve as a barrier between clients on the network and external threats. Forward proxies handle queries from internal clients when they access resources external to the network. Reverse proxies function opposite of forward proxies; they handle requests from external systems to services on the internal network. Some proxy servers can also be configured with rules, like a firewall. For example, you can create filters to block websites identified as containing malware.

### **Virtual Private Networks (VPN)**

A VPN is a service that encrypts data in transit and disguises your IP address. VPNs use a process called encapsulation. Encapsulation wraps your encrypted data in an unencrypted data packet, which allows your data to be sent across the public network while remaining anonymous. Enterprises and other organizations use VPNs to help protect communications from users’ devices to corporate resources. Some of these resources include connecting to servers or virtual machines that host business applications. VPNs can also be used for personal use to increase personal privacy. They allow the user to access the internet without anyone being able to read their personal information or access their private IP address. Organizations are increasingly using a combination of VPN and SD-WAN capabilities to secure their networks. A software-defined wide area network (SD-WAN) is a virtual WAN service that allows organizations to securely connect users to applications across multiple locations and over large geographical distances.

### **Key takeaways**

There are three main categories of network protocols: communication, management, and security protocols. In this reading, you learned the fundamentals of firewalls, proxy servers, and VPNs. More organizations are implementing a cloud-based approach to network security by incorporating a combination of VPN and SD-WAN capabilities as a service.

# Glossary terms from week 2

# Glossary terms from week 2

## Terms and definitions from Course 3, Week 2

**Address Resolution Protocol (ARP):** A network protocol used to determine the MAC address of the next router or device on the path

**Cloud-based firewalls:** Software firewalls that are hosted by the cloud service provider

**Controlled zone:** A subnet that protects the internal network from the uncontrolled zone

**Domain Name System (DNS):** A networking protocol that translates internet domain names into IP addresses

**Encapsulation:** A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

**Firewall:** A network security device that monitors traffic to or from your network

**Forward proxy server:** A server that regulates and restricts a person’s access to the internet

**Hypertext Transfer Protocol (HTTP):** An application layer protocol that provides a method of communication between clients and website servers

**Hypertext Transfer Protocol Secure (HTTPS):** A network protocol that provides a secure method of communication between clients and servers

**IEEE 802.11 (Wi-Fi):** A set of standards that define communication for wireless LANs

**Network protocols:** A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data

**Network segmentation:** A security technique that divides the network into segments

**Port filtering:** A firewall function that blocks or allows certain port numbers to limit unwanted communication

**Proxy server:** A server that fulfills the requests of its clients by forwarding them to other servers

**Reverse proxy server:** A server that regulates and restricts the internet's access to an internal server

**Secure File Transfer Protocol (SFTP):** A secure protocol used to transfer files from one device to another over a network

**Secure shell (SSH):** A security protocol used to create a shell with a remote system

**Security zone:** A segment of a company’s network that protects the internal network from the internet

**Simple Network Management Protocol (SNMP):** A network protocol used for monitoring and managing devices on a network

**Stateful:** A class of firewall that keeps track of information passing through it and proactively filters out threats

**Stateless:** A class of firewall that operates based on predefined rules and does not keep track of information from data packets

**Transmission Control Protocol (TCP):** An internet communication protocol that allows two devices to form a connection and stream data

**Uncontrolled zone:** The portion of the network outside the organization

**Virtual private network (VPN):** A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet

**Wi-Fi Protected Access (WPA):** A wireless security protocol for devices to connect to the internet

# Course 3 resources and citations

#   


# Week 1: Network architecture

## Resources

[Helpful resources to get started<svg aria-labelledby="cds-react-aria-631-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/supplement/u8Np0/helpful-resources-to-get-started)

- [Coursera Code of Conduct<svg aria-labelledby="cds-react-aria-632-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/208280036-Coursera-Code-of-Conduct?language=en_US)
- 
- [Coursera Honor Code<svg aria-labelledby="cds-react-aria-633-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/article/209818863-Coursera-Honor-Code?language=en_US)
- 
- [Coursera: Edit my profile<svg aria-labelledby="cds-react-aria-634-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/account-profile)
- 
- [Coursera: Learner Help Center<svg aria-labelledby="cds-react-aria-635-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learner.coursera.help/hc/en-us)
- 
- [Coursera’s Global Online Community<svg aria-labelledby="cds-react-aria-636-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--6" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.support/s/community?language=en_US)
- 
- [Google: Common problems with labs<svg aria-labelledby="cds-react-aria-637-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--7" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/qwiklabs/answer/9133560?hl=en&ref_topic=9134804)
- 
- [Google Docs help<svg aria-labelledby="cds-react-aria-638-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--8" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9046002?hl=en&ref_topic=1382883)
- 
- [Google Sheets help<svg aria-labelledby="cds-react-aria-639-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--9" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/topic/9054603?hl=en&ref_topic=1382883)
- 
- [How to use Google Slides<svg aria-labelledby="cds-react-aria-640-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--10" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.google.com/docs/answer/2763168?hl=en&co=GENIE.Platform%3DDesktop)
- 
- [Microsoft Excel help and learning<svg aria-labelledby="cds-react-aria-641-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--11" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/excel)
- 
- [PowerPoint help and learning<svg aria-labelledby="cds-react-aria-642-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--12" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/powerpoint)
- 
- [Word help and learning<svg aria-labelledby="cds-react-aria-643-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--13" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/word)

- 

## Citations

[Network components, devices, and diagrams<svg aria-labelledby="cds-react-aria-644-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--14" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/AdErf/network-components-devices-and-diagrams)

- Meyers, Mike, and Scott Jernigan. (2019) CompTIA A+ Certification All-in-One Exam Guide, (Exams 220-1001 &amp; 220-1002).
- Oluwatosin, H.S. (2014). Client-server model. *IOSR Journal of Computer Engineering*, *16*(1), 67-71.
- Sulyman, Shakirat. (2014). Client-Server Model. IOSR Journal of Computer Engineering. 16. 57-71. 10.9790/0661-16195771.
- GeeksforGeeks. (2022, March 21). [*Devices used in each layer of TCP/IP model*<svg aria-labelledby="cds-react-aria-645-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--15" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.geeksforgeeks.org/devices-used-in-each-layer-of-tcp-ip-model/)

*.*[ <svg aria-labelledby="cds-react-aria-646-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--16" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.geeksforgeeks.org/devices-used-in-each-layer-of-tcp-ip-model/)

- 

[Cloud computing and software-defined networks<svg aria-labelledby="cds-react-aria-647-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--17" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/kNUaM/cloud-computing-and-software-defined-networks)

- Rackspace Technology Colo Data Centers. (n.d.). [*What is colocation?*<svg aria-labelledby="cds-react-aria-648-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--18" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.rackspace.com/library/what-is-colocation)
- 
- Fortinet. (n.d.). [*What is hybrid cloud?*<svg aria-labelledby="cds-react-aria-649-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--19" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.fortinet.com/resources/cyberglossary/what-is-hybrid-cloud)

- 

[Learn more about the TCP/IP model<svg aria-labelledby="cds-react-aria-650-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--20" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/SXl0z/review-of-the-tcp-ip-model)

- Clarke, Glen E. (2018). CompTIA Network+ Certification Study Guide: Exam N10-007.
- International Business Machines. (2022, Nov 15). [*User datagram protocol*<svg aria-labelledby="cds-react-aria-651-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--21" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.2?topic=protocols-user-datagram-protocol)
- *.*
- International Business Machines. (2022, Nov 15). [*Transmission control protocol*<svg aria-labelledby="cds-react-aria-652-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--22" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol)
- *.*
- Oracle. (n.d.). [*TCP/IP protocol architecture model*<svg aria-labelledby="cds-react-aria-653-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--23" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-10/index.html)
- *.* System administration guide, volume 3.
- Study CCNA. (n.d.). [*OSI &amp; TCP/IP models*<svg aria-labelledby="cds-react-aria-654-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--24" role="img" viewbox="0 0 16 16" width="16"></svg>](https://study-ccna.com/osi-tcp-ip-models/)

- *.*

[The OSI model<svg aria-labelledby="cds-react-aria-655-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--25" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/YbKL0/the-osi-model-explained)

- Cloudflare. (n.d.). [*What is the OSI model?*<svg aria-labelledby="cds-react-aria-656-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--26" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/)
- 
- FreeCodeCamp. (2020, December 21). [*The OSI Model – The 7 Layers of Networking Explained in Plain English*<svg aria-labelledby="cds-react-aria-657-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--27" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.freecodecamp.org/news/osi-model-networking-layers-explained-in-plain-english/)
- .
- Imperva. (n.d.). [*OSI Model*<svg aria-labelledby="cds-react-aria-658-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--28" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.imperva.com/learn/application-security/osi-model/#:~:text=The%20session%20layer%20creates%20communication,closing%20them%20when%20communication%20ends)

- *.* Application security.

[Components of network layer communication<svg aria-labelledby="cds-react-aria-659-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--29" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/IRnxH/components-of-network-layer-communication)

- Agnė Srėbaliūtė. (2022, Aug 2). [*IPv4 packet header: Format and structure*<svg aria-labelledby="cds-react-aria-660-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--30" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipxo.com/blog/ipv4-packet-header/)
- . IPXO.
- Rajinder Kaur (2009) [*IPv4 Header*<svg aria-labelledby="cds-react-aria-661-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--31" role="img" viewbox="0 0 16 16" width="16"></svg>](https://advancedinternettechnologies.wordpress.com/ipv4-header/)
- . Advanced Internet Technologies.
- Gsephrioth. (2017). [*The IP diagram*<svg aria-labelledby="cds-react-aria-662-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--32" role="img" viewbox="0 0 16 16" width="16"></svg>](https://gsephrioth.github.io/Ch8-IP-Datagram/)

- *.*
- Wright, Robert. (October 1998). *IP Routing Primer*. O’Reilly.

# Week 2: Network operations

## Citations

[Network protocols<svg aria-labelledby="cds-react-aria-663-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--33" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/PUGBB/network-protocols)

- National Institute of Standards and Technology. (n.d.). [*Glossary*<svg aria-labelledby="cds-react-aria-664-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--34" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary)

- *.* Accessed December 2022.

[Common network protocols<svg aria-labelledby="cds-react-aria-665-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--35" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/Tsifz/common-network-protocols)

- Cloudflare. (n.d.). [*What is a protocol? | Network protocol definition*<svg aria-labelledby="cds-react-aria-666-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--36" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/)
- *.*
- CompTIA. (n.d.). [*What is a network protocol and how does it work?* <svg aria-labelledby="cds-react-aria-667-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--37" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.comptia.org/content/guides/what-is-a-network-protocol)
- 
- Oracle. (n.d.). [*TCP/IP protocol architecture model*<svg aria-labelledby="cds-react-aria-668-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--38" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-10/index.html)

- *.* System administration guide, volume 3.

[Additional network protocols <svg aria-labelledby="cds-react-aria-669-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--39" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/gh97f/additional-network-protocols)

- IBM. (2022, Oct 17). [*TCP/IP address and parameter assignment - Dynamic host configuration protocol*<svg aria-labelledby="cds-react-aria-670-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--40" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ibm.com/docs/en/aix/7.1?topic=tcpp-tcpip-address-parameter-assignment-dynamic-host-configuration-protocol)
- . IBM AIX documentation.
- Microsoft. (n.d.O). [*What are IMAP and POP?*<svg aria-labelledby="cds-react-aria-671-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--41" role="img" viewbox="0 0 16 16" width="16"></svg>](https://support.microsoft.com/en-us/office/what-are-imap-and-pop-ca2c5799-49f9-4079-aefe-ddca85d5b1c9)
- Microsoft Support.
- Microsoft. (2013, October 21). [*SMTP*<svg aria-labelledby="cds-react-aria-672-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--42" role="img" viewbox="0 0 16 16" width="16"></svg>](https://learn.microsoft.com/en-us/previous-versions/office/developer/exchange-server-2010/aa494182(v=exchg.140))

- *.*

[The evolution of wireless security protocols<svg aria-labelledby="cds-react-aria-673-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--43" role="img" viewbox="0 0 16 16" width="16"></svg>](http://coursera.org/learn/networks-and-network-security/supplement/x73QK/overview-of-wireless-security-protocols)

- Asus. (2022, January 14).  [*\[Wireless\] What is WPA3? What are the advantages of using WPA3?*<svg aria-labelledby="cds-react-aria-674-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--44" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.asus.com/support/FAQ/1042478/)
- FAQ.
- Britannica, T. Editors of Encyclopaedia (2022, February 3). [*Wi-Fi*<svg aria-labelledby="cds-react-aria-675-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--45" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.britannica.com/technology/Wi-Fi)
- . *Encyclopedia Britannica*.
- Cisco Press. (2010, April 9). [*Moving to WPA/WPA2-Enterprise wi-fi encryption*<svg aria-labelledby="cds-react-aria-676-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--46" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ciscopress.com/articles/article.asp?p=1576225)

- *.*

[Firewalls and network security measures <svg aria-labelledby="cds-react-aria-677-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--47" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/TrOAQ/firewalls-and-network-security-measures)

- Cisco. (n.d.). [*What is a firewall?* <svg aria-labelledby="cds-react-aria-678-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--48" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html)

- 

[Subnetting and CIDR<svg aria-labelledby="cds-react-aria-679-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--49" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/OObvl/subnetting-and-cidr)

- Cloudflare. (n.d.).[ *What is a subnet?*<svg aria-labelledby="cds-react-aria-680-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--50" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/)
- 
- Techopedia. (2017, July 18). [*Subnetting*<svg aria-labelledby="cds-react-aria-681-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--51" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.techopedia.com/definition/28328/subnetting)
- *.* Dictionary.
- IP Address Guide. (n.d.). [*CIDR to IPv4 Conversion*<svg aria-labelledby="cds-react-aria-682-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--52" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.ipaddressguide.com/cidr)

- . IPV4 Tools.

[Proxy servers<svg aria-labelledby="cds-react-aria-683-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--53" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/P0Wj5/securing-internal-networks-proxy-servers)

- National Institute of Standards and Technology. (n.d.). [*Glossary*<svg aria-labelledby="cds-react-aria-684-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--54" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/glossary)

- *.* Accessed December 2022.

# Week 3: Secure against network intrusions

## Resources

[Analyze network attacks<svg aria-labelledby="cds-react-aria-685-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--55" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/item/QHIX5)

- [CompTIA<svg aria-labelledby="cds-react-aria-686-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--56" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.comptia.org/blog/cybersecurity-skills-to-counter-ddos-attacks.)

- 

## Citations

[The case for securing networks <svg aria-labelledby="cds-react-aria-687-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--57" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/ZnVPC/the-case-for-securing-networks)

- Vinton, Kate. (2014, September 18). [*With 56 million cards compromised, Home Depot’s breach is bigger than Target’s*<svg aria-labelledby="cds-react-aria-688-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--58" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.forbes.com/sites/katevinton/2014/09/18/with-56-million-cards-compromised-home-depots-breach-is-bigger-than-targets/?sh=1514b8a53e74)

- *.* Forbes.

[Analyze network layer communication<svg aria-labelledby="cds-react-aria-689-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--59" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- Lager, Nathan. (2020, April 3). [Network Troubleshooting with Packet Captures<svg aria-labelledby="cds-react-aria-690-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--60" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.redhat.com/sysadmin/network-packet-captures)
- . Enable Sysadmin.
- Oracle. (n.d.) [How the TCP/IP Protocols Handle Data Communications (System Administration Guide: IP Services<svg aria-labelledby="cds-react-aria-691-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--61" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.oracle.com/cd/E19683-01/806-4075/ipov-100/index.html)

- ).

[Real-life DDoS attack<svg aria-labelledby="cds-react-aria-692-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--62" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/9ndLQ/real-life-ddos-attack)

- Olenick, D. (2020, December 10) [*Guilty plea in 2016 Dyn DDos attack*<svg aria-labelledby="cds-react-aria-693-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--63" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.bankinfosecurity.com/guilty-plea-in-2016-dyn-ddos-attack-a-15567#:~:text=Federal%20prosecutors%20estimate%20the%20attack,million%20due%20to%20the%20attack.)
- *.* Bank info security.
- Young, K (2022, January 10) [*Cyber case study: The Mirai DDoS attack on Dyn*<svg aria-labelledby="cds-react-aria-694-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--64" role="img" viewbox="0 0 16 16" width="16"></svg>](https://coverlink.com/case-study/mirai-ddos-attack-on-dyn/#:~:text=On%20Oct.,systems%20and%20overwhelm%20its%20infrastructure)

- . Coverlink.

[Overview of interception attacks<svg aria-labelledby="cds-react-aria-695-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--65" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/zCdHP/overview-of-interception-tactics)

- Engebretson, P. (2013). *The basics of hacking and penetration testing: ethical hacking and penetration testing made easy*. Elsevier.

# Week 4: Security hardening

## Resources

[Course 3 glossary <svg aria-labelledby="cds-react-aria-696-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--66" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/supplement/lFqNR/course-3-glossary)

[Apply OS hardening techniques<svg aria-labelledby="cds-react-aria-697-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--67" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- [Opensource.com<svg aria-labelledby="cds-react-aria-698-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--68" role="img" viewbox="0 0 16 16" width="16"></svg>](https://opensource.com/article/18/10/introduction-tcpdump)
- 
- [Iana.org<svg aria-labelledby="cds-react-aria-699-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--69" role="img" viewbox="0 0 16 16" width="16"></svg>](http://iana.org)
- 
- [Geekflare<svg aria-labelledby="cds-react-aria-700-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--70" role="img" viewbox="0 0 16 16" width="16"></svg>](https://geekflare.com/tcpdump-examples/)
- 
- [Packet Pushers<svg aria-labelledby="cds-react-aria-701-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--71" role="img" viewbox="0 0 16 16" width="16"></svg>](https://packetpushers.net/masterclass-tcpdump-interpreting-output/)

- 

## Citations

[OS hardening practices <svg aria-labelledby="cds-react-aria-702-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--72" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/sj35a/os-hardening-practices)

- National Institute of Security Technology. (2018, October). [*Guide to securing macOS 10.12 systems for IT professionals*<svg aria-labelledby="cds-react-aria-703-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--73" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/CSRC/media/Publications/sp/800-179/rev-1/draft/documents/sp800-179r1-draft.pdf)

- *.* Special publication 800-179, revision 1. Accessed December 2022.

[Apply OS hardening techniques<svg aria-labelledby="cds-react-aria-704-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--74" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/quiz/6XQKU/activity-apply-os-hardening-techniques)

- Doropoulos, N. (n.d.). [DNS Query Flood Attack. <svg aria-labelledby="cds-react-aria-705-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--75" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.linkedin.com/pulse/dns-query-flood-attack-nicholas-doropoulos.)

- Linkedin.

[Use the NIST Cybersecurity Framework to respond to a security<svg aria-labelledby="cds-react-aria-706-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--76" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/exam/AFji2/portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security)

- Bhardwaj, P. (2023, January 2). [How to detect an ICMP flood attack and protect your network.<svg aria-labelledby="cds-react-aria-707-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--77" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.makeuseof.com/how-to-detect-icmp-flood-attack/)

- 

Firch, J. (2023, February 28). [How to prevent a ICMP flood attack. <svg aria-labelledby="cds-react-aria-708-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--78" role="img" viewbox="0 0 16 16" width="16"></svg>](https://purplesec.us/prevent-ping-attacks/)

Google, Android, Chronicle, Google Drive, Google Sites, and YARA are trademarks owned by Google LLC. All other trademarks belong to their respective owners and are not affiliated with Google LLC.

# Introduction to intrusion tactics

# The case for securing networks

<div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-let%27s-start-by-answe"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's start by answering the question, why do we need secure networks?" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Let's start by answering the question, why do we need secure networks? </span></div><div aria-label="toggle video from As you've learned, networks are constantly at risk of attack from malicious hackers." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">As you've learned, networks are constantly at risk of attack from malicious hackers. </span></div><div aria-label="toggle video from Attackers can infiltrate networks via malware, spoofing, or packet sniffing." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Attackers can infiltrate networks via malware, spoofing, or packet sniffing. </span></div><div aria-label="toggle video from Network operations can also be disrupted by attacks such as packet flooding." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Network operations can also be disrupted by attacks such as packet flooding. </span></div><div aria-label="toggle video from As we go along, you're going to learn about these and" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">As we go along, you're going to learn about these and </span></div><div aria-label="toggle video from other common network intrusion attacks in more detail." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">other common network intrusion attacks in more detail. </span></div></div></div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item">  
</div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-protecting-a-network"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Protecting a network from these types of attacks is important." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Protecting a network from these types of attacks is important. </span></div><div aria-label="toggle video from If even one of them happens, it could have a catastrophic impact on an organization." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">If even one of them happens, it could have a catastrophic impact on an organization. </span></div><div aria-label="toggle video from Attacks can harm an organization by leaking valuable or" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Attacks can harm an organization by leaking valuable or </span></div><div aria-label="toggle video from confidential information." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">confidential information. </span></div><div aria-label="toggle video from They can also be damaging to an organization's reputation and" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">They can also be damaging to an organization's reputation and </span></div><div aria-label="toggle video from impact customer retention." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">impact customer retention. </span></div><div aria-label="toggle video from Mitigating attacks may also cost the organization money and time." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Mitigating attacks may also cost the organization money and time. </span></div></div></div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk--1"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item">  
</div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-over-the-last-few-ye"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Over the last few years," class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Over the last few years, </span></div><div aria-label="toggle video from there have been a number of examples of damage that cyber attacks can cause." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">there have been a number of examples of damage that cyber attacks can cause. </span></div><div aria-label="toggle video from One notorious example was an attack against the American home-improvement" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">One notorious example was an attack against the American home-improvement </span></div><div aria-label="toggle video from chain, Home Depot, in 2014." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">chain, Home Depot, in 2014. </span></div><div aria-label="toggle video from A group of hackers compromised and infected Home Depot servers with malware." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">A group of hackers compromised and infected Home Depot servers with malware. </span></div><div aria-label="toggle video from By the time network administrators shut down the attack, the hackers had already" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">By the time network administrators shut down the attack, the hackers had already </span></div><div aria-label="toggle video from taken the credit and debit card information for over 56 million customers." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">taken the credit and debit card information for over 56 million customers. </span></div></div></div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk--2"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now%2C-you-know-why-it"><div aria-label="toggle video from Now, you know why it's so important to secure a network." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Now, you know why it's so important to secure a network. </span></div><div aria-label="toggle video from But to keep a network secure," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">But to keep a network secure, </span></div><div aria-label="toggle video from you need to know what kinds of attacks to protect it from." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">you need to know what kinds of attacks to protect it from. </span></div><div aria-label="toggle video from current lecture segment: Coming up, you'll learn about some common network attacks." class="rc-Phrase active css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Coming up, you'll learn about some common network attacks. </span></div></div># How intrusions compromise your system

In this section of the course, you learned that every network has inherent vulnerabilities and could become the target of a network attack.

Attackers could have varying motivations for attacking your organization’s network. They may have financial, personal, or political motivations, or they may be a disgruntled employee or an activist who disagrees with the company's values and wants to harm an organization’s operations. Malicious actors can target any network. Security analysts must be constantly alert to potential vulnerabilities in their organization’s network and take quick action to mitigate them.

In this reading, you’ll learn about network interception attacks and backdoor attacks, and the possible impacts these attacks could have on an organization.

## Network interception attacks 

Network interception attacks work by intercepting network traffic and stealing valuable information or interfering with the transmission in some way.

Malicious actors can use hardware or software tools to capture and inspect data in transit. This is referred to as **packet sniffing**. In addition to seeing information that they are not entitled to, malicious actors can also intercept network traffic and alter it. These attacks can cause damage to an organization’s network by inserting malicious code modifications or altering the message and interrupting network operations. For example, an attacker can intercept a bank transfer and change the account receiving the funds to one that the attacker controls.

Later in this course you will learn more about malicious packet sniffing, and other types of network interception attacks: on-path attacks and replay attacks.

## Backdoor attacks

A **backdoor attack** is another type of attack you will need to be aware of as a security analyst. An organization may have a lot of security measures in place, including cameras, biometric scans and access codes to keep employees from entering and exiting without being seen. However, an employee might work around the security measures by finding a backdoor to the building that is not as heavily monitored, allowing them to sneak out for the afternoon without being seen.

In cybersecurity, backdoors are weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms. Backdoors are intended to help programmers conduct troubleshooting or administrative tasks. However, backdoors can also be installed by attackers after they’ve compromised an organization to ensure they have persistent access.

Once the hacker has entered an insecure network through a backdoor, they can cause extensive damage: installing malware, performing a denial of service (DoS) attack, stealing private information or changing other security settings that leaves the system vulnerable to other attacks. A **DoS attack** is an attack that targets a network or server and floods it with network traffic.

## Possible impacts on an organization

As you’ve learned already, network attacks can have a significant negative impact on an organization. Let’s examine some potential consequences.

<div aria-label="toggle video from current lecture segment: Coming up, you'll learn about some common network attacks." class="rc-Phrase active css-ugczj4" data-cue="24" data-cue-index="23" id="bkmrk-financial%3A-when-a-sy" role="button" tabindex="0"><div aria-label="toggle video from current lecture segment: Coming up, you'll learn about some common network attacks." class="rc-Phrase active css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><div class="rc-CML" dir="auto"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Financial**: When a system is taken offline with a DoS attack, or business operations are halted or slowed down by some other tactic, they prevent a company from performing the tasks that generate revenue. Depending on the size of an organization, interrupted operations can cost millions of dollars. In addition, if a malicious actor gets access to the personal information of the company’s clients or customers, the company may face heavy litigation and settlement costs if customers seek legal recourse.
- **Reputation**: Attacks can also have a negative impact on the reputation of an organization. If it becomes public knowledge that a company has experienced a cyber attack, the public may become concerned about the security practices of the organization. They may stop trusting the company with their personal information and choose a competitor to fulfill their needs.
- **Public safety**: If an attack occurs on a government network, this can potentially impact the safety and welfare of the citizens of a country. In recent years, defense agencies across the globe are investing heavily in combating cyber warfare tactics. If a malicious actor gained access to a power grid, a public water system, or even a military defense communication system, the public could face physical harm due to a network intrusion attack.

</div></div></div></div></div></div></div></div>## Key takeaways

Malicious actors are constantly looking for ways to exploit systems. They learn about new vulnerabilities as they arise and attempt to exploit every vulnerability in a system. Attackers leverage backdoor attack methods and network interception attacks to gain sensitive information they can use to exploit an organization or cause serious damage. These types of attacks can impact an organization financially, damage its reputation, and potentially put the public in danger. It is important that security analysts stay educated in order to maintain network safety and reduce the likelihood and impact of these types of attacks. Securing networks has never been more important.

# Matt: A professional on dealing with attacks

<div class="phrases" id="bkmrk-my-name%27s-matt%2C-i%27m-"><div aria-label="toggle video from My name's Matt, I'm a chaos specialist at Google." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">My name's Matt, I'm a chaos specialist at Google. </span></div><div aria-label="toggle video from They let us choose our own job titles to best describe what it is we do." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They let us choose our own job titles to best describe what it is we do. </span></div><div aria-label="toggle video from I spend a lot of my time planning for" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I spend a lot of my time planning for </span></div><div aria-label="toggle video from how to take care of anything that might possibly be going wrong, and" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">how to take care of anything that might possibly be going wrong, and </span></div><div aria-label="toggle video from when it does happen, putting a team in place to fix it as quickly as possible." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">when it does happen, putting a team in place to fix it as quickly as possible. </span></div><div aria-label="toggle video from I had no intention of being in technology at all." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I had no intention of being in technology at all. </span></div><div aria-label="toggle video from current lecture segment: In high school, I was a lifeguard, first at public pools and then at a state beach." class="rc-Phrase active css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In high school, I was a lifeguard, first at public pools and then at a state beach. </span></div><div aria-label="toggle video from Lifeguarding got me into really enjoying rescue." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Lifeguarding got me into really enjoying rescue. </span></div><div aria-label="toggle video from So I got an EMT license, went through firefighter school. About halfway through" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So I got an EMT license, went through firefighter school. About halfway through </span></div><div aria-label="toggle video from my college process, and well into when I was being a firefighter on a daily basis." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">my college process, and well into when I was being a firefighter on a daily basis. </span></div><div aria-label="toggle video from I was dealing with some burnout, some stress." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I was dealing with some burnout, some stress. </span></div><div aria-label="toggle video from I needed a change in my life." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I needed a change in my life. </span></div><div aria-label="toggle video from And a friend of mine who I'd been online gaming with since the early days" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And a friend of mine who I'd been online gaming with since the early days </span></div><div aria-label="toggle video from of online gaming, when it was all text based," class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of online gaming, when it was all text based, </span></div><div aria-label="toggle video from he said, I can tell you're burning out hard and you need a change." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">he said, I can tell you're burning out hard and you need a change. </span></div><div aria-label="toggle video from My friends and I are going to San Francisco to start a startup." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">My friends and I are going to San Francisco to start a startup. </span></div><div aria-label="toggle video from Will you come with us?" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Will you come with us? </span></div><div aria-label="toggle video from And I said, you realize I am not a computer guy, right?" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And I said, you realize I am not a computer guy, right? </span></div><div aria-label="toggle video from And he said, no, you're a computer guy, you just won't admit it." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And he said, no, you're a computer guy, you just won't admit it. </span></div><div aria-label="toggle video from The same thing that has drawn me into incident response in tech is what" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The same thing that has drawn me into incident response in tech is what </span></div><div aria-label="toggle video from originally drew me to medical response." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">originally drew me to medical response. </span></div><div aria-label="toggle video from I really love being there for people on their worst day." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I really love being there for people on their worst day. </span></div><div aria-label="toggle video from Being there when people really need you and" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Being there when people really need you and </span></div><div aria-label="toggle video from they don't know where else to turn to has always just fed this part of me, and" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they don't know where else to turn to has always just fed this part of me, and </span></div><div aria-label="toggle video from I'm lucky to find that same joy in DFIR, Digital Forensics and Incident Response." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm lucky to find that same joy in DFIR, Digital Forensics and Incident Response. </span></div><div aria-label="toggle video from What type of attacks have we faced at Google?" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What type of attacks have we faced at Google? </span></div><div aria-label="toggle video from That's a hard question to answer," class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That's a hard question to answer, </span></div><div aria-label="toggle video from because we face all of the kinds of attacks that most other companies face." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">because we face all of the kinds of attacks that most other companies face. </span></div><div aria-label="toggle video from People after ransomware, people after industrial secrets," class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">People after ransomware, people after industrial secrets, </span></div><div aria-label="toggle video from other countries looking for intelligence information." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">other countries looking for intelligence information. </span></div><div aria-label="toggle video from There was a really interesting attack that occurred a little while ago." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There was a really interesting attack that occurred a little while ago. </span></div><div aria-label="toggle video from They were interested in getting a lot of information from technical companies," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They were interested in getting a lot of information from technical companies, </span></div><div aria-label="toggle video from specifically about vulnerabilities in software." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">specifically about vulnerabilities in software. </span></div><div aria-label="toggle video from And they put in place a long running campaign to build personalities on" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And they put in place a long running campaign to build personalities on </span></div><div aria-label="toggle video from social media as though they were legitimate security researchers, and" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">social media as though they were legitimate security researchers, and </span></div><div aria-label="toggle video from then reach out to other security researchers in our field," class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then reach out to other security researchers in our field, </span></div><div aria-label="toggle video from build relationships, and then just at the right moment, sneak in some malware." class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">build relationships, and then just at the right moment, sneak in some malware. </span></div><div aria-label="toggle video from Being under attack by an adversary who's made some progress is incredibly" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Being under attack by an adversary who's made some progress is incredibly </span></div><div aria-label="toggle video from stressful." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">stressful. </span></div><div aria-label="toggle video from The first things you're thinking and" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The first things you're thinking and </span></div><div aria-label="toggle video from feeling are a little bit of a sense of panic." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">feeling are a little bit of a sense of panic. </span></div><div aria-label="toggle video from Oh no, this is going to be a bad day." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Oh no, this is going to be a bad day. </span></div><div aria-label="toggle video from How long am I going to be awake working on this?" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">How long am I going to be awake working on this? </span></div><div aria-label="toggle video from What have they done?" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What have they done? </span></div><div aria-label="toggle video from What am I going to do?" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What am I going to do? </span></div><div aria-label="toggle video from And for me, the mantra that I repeat to myself is, as an incident responder," class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And for me, the mantra that I repeat to myself is, as an incident responder, </span></div><div aria-label="toggle video from I am here to help." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I am here to help. </span></div><div aria-label="toggle video from The things that are most important to having a good outcome" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The things that are most important to having a good outcome </span></div><div aria-label="toggle video from in an incident are what we call the 3Cs: Command, Control and" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in an incident are what we call the 3Cs: Command, Control and </span></div><div aria-label="toggle video from Communications. Meaning someone needs to be in charge of it affirmatively leading." class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Communications. Meaning someone needs to be in charge of it affirmatively leading. </span></div><div aria-label="toggle video from Someone needs to be exerting control over everyone involved so" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Someone needs to be exerting control over everyone involved so </span></div><div aria-label="toggle video from that everyone's aligned, focused on the mission, and the biggest and" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that everyone's aligned, focused on the mission, and the biggest and </span></div><div aria-label="toggle video from most important one of them all: proper communications." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">most important one of them all: proper communications. </span></div><div aria-label="toggle video from If you have something to offer to the incident," class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If you have something to offer to the incident, </span></div><div aria-label="toggle video from don't just go do it, Communicate to someone." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">don't just go do it, Communicate to someone. </span></div><div aria-label="toggle video from I think I could do this to help us make progress." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I think I could do this to help us make progress. </span></div><div aria-label="toggle video from I think if we look over here, we'll find more data." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I think if we look over here, we'll find more data. </span></div><div aria-label="toggle video from The advice that I would give somebody who wants to get into cybersecurity is if you" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The advice that I would give somebody who wants to get into cybersecurity is if you </span></div><div aria-label="toggle video from want it, you probably belong here." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">want it, you probably belong here. </span></div><div aria-label="toggle video from The more people we have in here, who are passionate, curious question askers," class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The more people we have in here, who are passionate, curious question askers, </span></div><div aria-label="toggle video from who want to know more, who want to build better, and who care about" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">who want to know more, who want to build better, and who care about </span></div><div aria-label="toggle video from making every thing more secure for the people who have to use technology," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">making every thing more secure for the people who have to use technology, </span></div><div aria-label="toggle video from those are people we want in the industry and I would want you here." class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">those are people we want in the industry and I would want you here. </span></div></div>

# Denial of Service (DoS) attacks

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-welcome-back.-in-thi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Welcome back. In this video," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Welcome back. In this video, </span></div><div aria-label="toggle video from we're going to discuss denial of service attacks." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we're going to discuss denial of service attacks. </span></div><div aria-label="toggle video from A denial of service attack is" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A denial of service attack is </span></div><div aria-label="toggle video from an attack that targets a network or server" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an attack that targets a network or server </span></div><div aria-label="toggle video from and floods it with network traffic." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and floods it with network traffic. </span></div><div aria-label="toggle video from The objective of a denial of service attack," class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The objective of a denial of service attack, </span></div><div aria-label="toggle video from or a DoS attack, is to disrupt" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a DoS attack, is to disrupt </span></div><div aria-label="toggle video from normal business operations by" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">normal business operations by </span></div><div aria-label="toggle video from overloading an organization's network." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">overloading an organization's network. </span></div><div aria-label="toggle video from The goal of the attack is to send" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal of the attack is to send </span></div><div aria-label="toggle video from so much information to a network device" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so much information to a network device </span></div><div aria-label="toggle video from that it crashes or is" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that it crashes or is </span></div><div aria-label="toggle video from unable to respond to legitimate users." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">unable to respond to legitimate users. </span></div><div aria-label="toggle video from This means that the organization won't" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This means that the organization won't </span></div><div aria-label="toggle video from current lecture segment: be able to conduct their normal business operations," class="rc-Phrase active css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be able to conduct their normal business operations, </span></div><div aria-label="toggle video from which can cost them money and time." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which can cost them money and time. </span></div><div aria-label="toggle video from A network crash can also leave them" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A network crash can also leave them </span></div><div aria-label="toggle video from vulnerable to other security threats and attacks." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">vulnerable to other security threats and attacks. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-distributed-denial"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A distributed denial of service attack, or DDoS," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A distributed denial of service attack, or DDoS, </span></div><div aria-label="toggle video from is a kind of DoS attack that uses" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is a kind of DoS attack that uses </span></div><div aria-label="toggle video from multiple devices or servers in" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">multiple devices or servers in </span></div><div aria-label="toggle video from different locations to flood" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">different locations to flood </span></div><div aria-label="toggle video from the target network with unwanted traffic." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the target network with unwanted traffic. </span></div><div aria-label="toggle video from Use of numerous devices makes it more likely that" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Use of numerous devices makes it more likely that </span></div><div aria-label="toggle video from the total amount of traffic" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the total amount of traffic </span></div><div aria-label="toggle video from sent will overwhelm the target server." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">sent will overwhelm the target server. </span></div><div aria-label="toggle video from Remember, DoS stands for denial of service." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Remember, DoS stands for denial of service. </span></div><div aria-label="toggle video from So it doesn't matter what part" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So it doesn't matter what part </span></div><div aria-label="toggle video from of the network the attacker overloads;" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of the network the attacker overloads; </span></div><div aria-label="toggle video from if they overload anything, they win." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">if they overload anything, they win. </span></div><div aria-label="toggle video from An unfortunate example I've" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An unfortunate example I've </span></div><div aria-label="toggle video from seen is an attacker who crafted" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">seen is an attacker who crafted </span></div><div aria-label="toggle video from a very careful packet that caused" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a very careful packet that caused </span></div><div aria-label="toggle video from a router to spend extra time processing the request." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a router to spend extra time processing the request. </span></div><div aria-label="toggle video from The overall traffic volume didn't overload the router;" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The overall traffic volume didn't overload the router; </span></div><div aria-label="toggle video from the specifics within the packet did." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the specifics within the packet did. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now-we%27ll-discuss-ne"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now we'll discuss network level DoS attacks" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now we'll discuss network level DoS attacks </span></div><div aria-label="toggle video from that target network bandwidth to slow traffic." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that target network bandwidth to slow traffic. </span></div><div aria-label="toggle video from Let's learn about three common network level DoS attacks." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's learn about three common network level DoS attacks. </span></div><div aria-label="toggle video from The first is called a SYN flood attack." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The first is called a SYN flood attack. </span></div><div aria-label="toggle video from A SYN flood attack is a type of" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A SYN flood attack is a type of </span></div><div aria-label="toggle video from DoS attack that simulates the TCP connection" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">DoS attack that simulates the TCP connection </span></div><div aria-label="toggle video from and floods the server with SYN packets." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and floods the server with SYN packets. </span></div><div aria-label="toggle video from Let's break this definition down a bit" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's break this definition down a bit </span></div><div aria-label="toggle video from more by taking a closer look at" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">more by taking a closer look at </span></div><div aria-label="toggle video from the handshake process that is used to establish" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the handshake process that is used to establish </span></div><div aria-label="toggle video from a TCP connection between a device and a server." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a TCP connection between a device and a server. </span></div><div aria-label="toggle video from The first step in the handshake is for the device to send" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The first step in the handshake is for the device to send </span></div><div aria-label="toggle video from a SYN, or synchronize, request to the server." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a SYN, or synchronize, request to the server. </span></div><div aria-label="toggle video from Then, the server responds with" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, the server responds with </span></div><div aria-label="toggle video from a SYN/ACK packet to" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a SYN/ACK packet to </span></div><div aria-label="toggle video from acknowledge the receipt of the device's request" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">acknowledge the receipt of the device's request </span></div><div aria-label="toggle video from and leaves a port open for" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and leaves a port open for </span></div><div aria-label="toggle video from the final step of the handshake." class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the final step of the handshake. </span></div><div aria-label="toggle video from Once the server receives" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Once the server receives </span></div><div aria-label="toggle video from the final ACK packet from the device," class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the final ACK packet from the device, </span></div><div aria-label="toggle video from a TCP connection is established." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a TCP connection is established. </span></div><div aria-label="toggle video from Malicious actors can take advantage of the protocol by" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Malicious actors can take advantage of the protocol by </span></div><div aria-label="toggle video from flooding a server with" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">flooding a server with </span></div><div aria-label="toggle video from SYN packet requests for the first part of the handshake." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">SYN packet requests for the first part of the handshake. </span></div><div aria-label="toggle video from But if the number of SYN requests is" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But if the number of SYN requests is </span></div><div aria-label="toggle video from larger than the number of available ports on the server," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">larger than the number of available ports on the server, </span></div><div aria-label="toggle video from then the server will be overwhelmed" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then the server will be overwhelmed </span></div><div aria-label="toggle video from and become unable to function." class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and become unable to function. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-discuss-two-ot"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's discuss two other common DoS attacks" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's discuss two other common DoS attacks </span></div><div aria-label="toggle video from that use another protocol called ICMP." class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that use another protocol called ICMP. </span></div><div aria-label="toggle video from ICMP stands for Internet Control Message Protocol." class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">ICMP stands for Internet Control Message Protocol. </span></div><div aria-label="toggle video from ICMP is an internet protocol used by devices" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">ICMP is an internet protocol used by devices </span></div><div aria-label="toggle video from to tell each other about" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to tell each other about </span></div><div aria-label="toggle video from data transmission errors across the network." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data transmission errors across the network. </span></div><div aria-label="toggle video from Think of ICMP like a request" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Think of ICMP like a request </span></div><div aria-label="toggle video from for a status update from a device." class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">for a status update from a device. </span></div><div aria-label="toggle video from The device will return" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The device will return </span></div><div aria-label="toggle video from error messages if there is a network concern." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">error messages if there is a network concern. </span></div><div aria-label="toggle video from You can think of this like" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You can think of this like </span></div><div aria-label="toggle video from the ICMP request checking in with" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the ICMP request checking in with </span></div><div aria-label="toggle video from the device to make sure that all is well." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the device to make sure that all is well. </span></div><div aria-label="toggle video from An ICMP flood attack" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An ICMP flood attack </span></div><div aria-label="toggle video from is a type of DoS attack performed by an attacker" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is a type of DoS attack performed by an attacker </span></div><div aria-label="toggle video from repeatedly sending ICMP packets to a network server." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">repeatedly sending ICMP packets to a network server. </span></div><div aria-label="toggle video from This forces the server to send an ICMP packet." class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This forces the server to send an ICMP packet. </span></div><div aria-label="toggle video from This eventually uses up all the bandwidth for incoming" class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This eventually uses up all the bandwidth for incoming </span></div><div aria-label="toggle video from and outgoing traffic and causes the server to crash." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and outgoing traffic and causes the server to crash. </span></div><div aria-label="toggle video from Both of the attacks we've discussed so far," class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Both of the attacks we've discussed so far, </span></div><div aria-label="toggle video from SYN flood and ICMP flood," class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">SYN flood and ICMP flood, </span></div><div aria-label="toggle video from take advantage of communication protocols" class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">take advantage of communication protocols </span></div><div aria-label="toggle video from by sending an overwhelming number of requests." class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by sending an overwhelming number of requests. </span></div><div aria-label="toggle video from There are also attacks that can overwhelm" class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are also attacks that can overwhelm </span></div><div aria-label="toggle video from the server with one big request." class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the server with one big request. </span></div><div aria-label="toggle video from One example that we'll discuss" class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One example that we'll discuss </span></div><div aria-label="toggle video from is called the ping of death." class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is called the ping of death. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-ping-of-death-atta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A ping of death attack is" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A ping of death attack is </span></div><div aria-label="toggle video from a type of DoS attack that is caused when a hacker" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a type of DoS attack that is caused when a hacker </span></div><div aria-label="toggle video from pings a system by sending it" class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">pings a system by sending it </span></div><div aria-label="toggle video from an oversized ICMP packet" class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an oversized ICMP packet </span></div><div aria-label="toggle video from that is bigger than 64 kilobytes," class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that is bigger than 64 kilobytes, </span></div><div aria-label="toggle video from the maximum size for a correctly formed ICMP packet." class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the maximum size for a correctly formed ICMP packet. </span></div><div aria-label="toggle video from Pinging a vulnerable network server with" class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Pinging a vulnerable network server with </span></div><div aria-label="toggle video from an oversized ICMP packet" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an oversized ICMP packet </span></div><div aria-label="toggle video from will overload the system and cause it to crash." class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">will overload the system and cause it to crash. </span></div><div aria-label="toggle video from Think of this like dropping a rock on a small anthill." class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Think of this like dropping a rock on a small anthill. </span></div><div aria-label="toggle video from Each individual ant can carry a certain amount of" class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Each individual ant can carry a certain amount of </span></div><div aria-label="toggle video from weight while transporting food to and from the anthill." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">weight while transporting food to and from the anthill. </span></div><div aria-label="toggle video from But if a large rock is dropped on the anthill," class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But if a large rock is dropped on the anthill, </span></div><div aria-label="toggle video from then many ants will be crushed, and the colony is unable to" class="rc-Phrase css-ugczj4" data-cue="105" data-cue-index="104" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then many ants will be crushed, and the colony is unable to </span></div><div aria-label="toggle video from function until it rebuilds its operations elsewhere." class="rc-Phrase css-ugczj4" data-cue="106" data-cue-index="105" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">function until it rebuilds its operations elsewhere. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-arowdh cds-3 cds-grid-item cds-48 cds-73" id="bkmrk-now-that%27s-it-for-do"><div><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that's it for DoS and DDoS attacks." class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now that's it for DoS and DDoS attacks. </span></div><div aria-label="toggle video from Coming up, we'll continue to" class="rc-Phrase css-ugczj4" data-cue="108" data-cue-index="107" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll continue to </span></div><div aria-label="toggle video from discuss common network attacks." class="rc-Phrase css-ugczj4" data-cue="109" data-cue-index="108" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss common network attacks. </span></div></div></div></div></div></div></div></div><div class="cds-1 css-hcqebr cds-3 cds-grid-item cds-48 cds-66" id="bkmrk--5"><div class="cds-316 cds-formControl-root css-4p0j7c cds-319"><div class="css-1whdyhf" data-testid="visually-hidden">  
</div><label class="cds-320 cds-formLabel-root cds-formLabel-onLight css-wamxw1 cds-325 cds-326" for="cds-react-aria-97" id="bkmrk--6"></label></div></div>

# Read tcpdump logs

A **network protocol analyzer**, sometimes called a packet sniffer or a packet analyzer, is a tool designed to capture and analyze data traffic within a network. They are commonly used as investigative tools to monitor networks and identify suspicious activity. There are a wide variety of network protocol analyzers available, but some of the most common analyzers include:

- SolarWinds NetFlow Traffic Analyzer
- ManageEngine OpManager
- Azure Network Watcher
- Wireshark
- tcpdump

This reading will focus exclusively on tcpdump, though you can apply what you learn here to many of the other network protocol analyzers you'll use as a cybersecurity analyst to defend against any network intrusions. In an upcoming activity, you’ll review a tcpdump data traffic log and identify a DoS attack to practice these skills.

## tcpdump 

**tcpdump** is a command-line network protocol analyzer. It is popular, lightweight–meaning it uses little memory and has a low CPU usage–and uses the open-source libpcap library. tcpdump is text based, meaning all commands in tcpdump are executed in the terminal. It can also be installed on other Unix-based operating systems, such as macOS®. It is preinstalled on many Linux distributions.

tcpdump provides a brief packet analysis and converts key information about network traffic into formats easily read by humans. It prints information about each packet directly into your terminal. tcpdump also displays the source IP address, destination IP addresses, and the port numbers being used in the communications.

## Interpreting output

tcpdump prints the output of the command as the sniffed packets in the command line, and optionally to a log file, after a command is executed. The output of a packet capture contains many pieces of important information about the network traffic.

<div id="bkmrk-"><figure contenteditable="false" role="figure">![types of information presented in a tcpdump packet capture.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/B-PaECh0ToSFgBWpFczYZg_4896abe8c06443f08eec4dc003dcf8f1_image.png?expiry=1688342400000&hmac=5CynS0Xp2yof_cTaZpZkj3Rm8UkSKLzV2pLTXwn2mm8)</figure></div>Some information you receive from a packet capture includes:

- **Timestamp**: The output begins with the timestamp, formatted as hours, minutes, seconds, and fractions of a second.
- **Source IP**: The packet’s origin is provided by its source IP address.
- **Source port**: This port number is where the packet originated.
- **Destination IP**: The destination IP address is where the packet is being transmitted to.
- **Destination port**: This port number is where the packet is being transmitted to.

**Note:** By default, tcpdump will attempt to resolve host addresses to hostnames. It'll also replace port numbers with commonly associated services that use these ports.

## Common uses

tcpdump and other network protocol analyzers are commonly used to capture and view network communications and to collect statistics about the network, such as troubleshooting network performance issues. They can also be used to:

- Establish a baseline for network traffic patterns and network utilization metrics.
- Detect and identify malicious traffic
- Create customized alerts to send the right notifications when network issues or security threats arise.
- Locate unauthorized instant messaging (IM), traffic, or wireless access points.

However, attackers can also use network protocol analyzers maliciously to gain information about a specific network. For example, attackers can capture data packets that contain sensitive information, such as account usernames and passwords. As a cybersecurity analyst, It’s important to understand the purpose and uses of network protocol analyzers.

## Key takeaways

Network protocol analyzers, like tcpdump, are common tools that can be used to monitor network traffic patterns and investigate suspicious activity. tcpdump is a command-line network protocol analyzer that is compatible with Linux/Unix and macOS®. When you run a tcpdump command, the tool will output packet routing information, like the timestamp, source IP address and port number, and the destination IP address and port number. Unfortunately, attackers can also use network protocol analyzers to capture data packets that contain sensitive information, such as account usernames and passwords.

# Real-life DDoS attack

Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumetric distributed DoS (DDoS) attacks overwhelm a network by sending unwanted data packets in such large quantities that the servers become unable to service normal users. This can be detrimental to an organization. When systems fail, organizations cannot meet their customers' needs. They often lose money, and in some cases, incur other losses. An organization’s reputation may also suffer if news of a successful DDoS attack reaches consumers, who then question the security of the organization.

In this reading you’ll learn about a 2016 DDoS attack against DNS servers that caused major outages at multiple organizations that have millions of daily users.

## A DDoS targeting a widely used DNS server 

In previous videos, you learned about the function of a DNS server. As a review, DNS servers translate website domain names into the IP address of the system that contains the information for the website. For instance, if a user were to type in a website URL, a DNS server would translate that into a numeric IP address that directs network traffic to the location of the website’s server.

On the day of the DDoS attack we are studying, many large companies were using a DNS service provider. The service provider was hosting the DNS system for these companies. This meant that when internet users typed in the URL of the website they wanted to access, their devices would be directed to the right place. On October 21, 2016, the service provider was the victim of a DDoS attack.

## Leading up to the attack

Before the attack on the service provider, a group of university students created a botnet. A **botnet** is a collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder." Each computer in the botnet can be remotely controlled to send a data packet to a target system. In a botnet attack, cyber criminals instruct all the bots on the botnet to send data packets to the target system at the same time, resulting in a DDoS attack.

The group of university students posted the code for the botnet online so that it would be accessible to thousands of internet users and authorities wouldn’t be able to trace the botnet back to the students. In doing so, they made it possible for other malicious actors to learn the code to the botnet and control it remotely. This included the cyber criminals who attacked the DNS service provider.

## The day of attack

At 7:00 a.m. on the day of the attack, the botnet sent tens of millions of DNS requests to the service provider. This overwhelmed the system and the DNS service shut down. This meant that all of the websites that used the service provider could not be reached. When users tried to access various websites that used the service provider, they were not directed to the website they typed in their browser. Outages for each web service occurred all over North America and Europe.

The service provider’s systems were restored after only two hours of downtime. Although the cyber criminals sent subsequent waves of botnet attacks, the DNS company was prepared and able to mitigate the impact.

## Key takeaways

As demonstrated in the above example, DDoS attacks can be very damaging to an organization. As a security analyst, it’s important to acknowledge the seriousness of such an attack so that you’re aware of opportunities to protect the network from them. If your network has important operations distributed across hosts that can be dynamically scaled, then operations can continue if the baseline host infrastructure goes offline. DDoS attacks are damaging, but there are concrete actions that security analysts can take to help protect their organizations. Keep going through this course and you will learn about common mitigation strategies to protect against DDoS attacks.

# Malicious packet sniffing

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-video%2C-we%27ll"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this video, we'll discuss" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this video, we'll discuss </span></div><div aria-label="toggle video from packet sniffing, with a focus on how" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packet sniffing, with a focus on how </span></div><div aria-label="toggle video from threat actors may use this technique to" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">threat actors may use this technique to </span></div><div aria-label="toggle video from gain unauthorized access to information." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">gain unauthorized access to information. </span></div><div aria-label="toggle video from Previously, you learned about" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, you learned about </span></div><div aria-label="toggle video from the information and data packets" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the information and data packets </span></div><div aria-label="toggle video from that travel across the network." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that travel across the network. </span></div><div aria-label="toggle video from Packets include a header which contains" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packets include a header which contains </span></div><div aria-label="toggle video from the sender's and receiver's IP addresses." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the sender's and receiver's IP addresses. </span></div><div aria-label="toggle video from Packets also contain a body, which" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packets also contain a body, which </span></div><div aria-label="toggle video from may contain valuable information like names," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">may contain valuable information like names, </span></div><div aria-label="toggle video from date of birth, personal messages," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">date of birth, personal messages, </span></div><div aria-label="toggle video from financial information, and credit card numbers." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">financial information, and credit card numbers. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-packet-sniffing-is-t"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Packet sniffing is the practice of using" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packet sniffing is the practice of using </span></div><div aria-label="toggle video from software tools to observe" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">software tools to observe </span></div><div aria-label="toggle video from data as it moves across a network." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data as it moves across a network. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, </span></div><div aria-label="toggle video from you may use packet sniffing to analyze and capture" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you may use packet sniffing to analyze and capture </span></div><div aria-label="toggle video from packets when investigating ongoing incidents" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packets when investigating ongoing incidents </span></div><div aria-label="toggle video from or debugging network issues." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or debugging network issues. </span></div><div aria-label="toggle video from Later in this certificate program," class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Later in this certificate program, </span></div><div aria-label="toggle video from current lecture segment: you'll gain hands-on practice" class="rc-Phrase active css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you'll gain hands-on practice </span></div><div aria-label="toggle video from with some packet sniffing software." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with some packet sniffing software. </span></div><div aria-label="toggle video from However, malicious actors may also use" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">However, malicious actors may also use </span></div><div aria-label="toggle video from packet sniffing to look at" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packet sniffing to look at </span></div><div aria-label="toggle video from data that has not been sent to them." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data that has not been sent to them. </span></div><div aria-label="toggle video from This is a little bit like opening somebody else's mail." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is a little bit like opening somebody else's mail. </span></div><div aria-label="toggle video from It's important for you to learn about how" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's important for you to learn about how </span></div><div aria-label="toggle video from threat actors use packet sniffing" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">threat actors use packet sniffing </span></div><div aria-label="toggle video from with harmful intent so you can be" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with harmful intent so you can be </span></div><div aria-label="toggle video from prepared to protect against these malicious acts." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">prepared to protect against these malicious acts. </span></div><div aria-label="toggle video from Malicious actors may insert themselves in the middle of" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Malicious actors may insert themselves in the middle of </span></div><div aria-label="toggle video from an authorized connection between two devices." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an authorized connection between two devices. </span></div><div aria-label="toggle video from Then they can use packet sniffing to spy on" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then they can use packet sniffing to spy on </span></div><div aria-label="toggle video from every data packet as it comes across their device." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">every data packet as it comes across their device. </span></div><div aria-label="toggle video from The goal is to find valuable information in" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal is to find valuable information in </span></div><div aria-label="toggle video from the data packets that they can" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the data packets that they can </span></div><div aria-label="toggle video from then use to their advantage." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then use to their advantage. </span></div><div aria-label="toggle video from Attackers can use software applications" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Attackers can use software applications </span></div><div aria-label="toggle video from or a hardware device to look into data packets." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a hardware device to look into data packets. </span></div><div aria-label="toggle video from Malicious actors can access a network packet with" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Malicious actors can access a network packet with </span></div><div aria-label="toggle video from a packet sniffer and make changes to the data." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a packet sniffer and make changes to the data. </span></div><div aria-label="toggle video from They may change the information" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They may change the information </span></div><div aria-label="toggle video from in the body of the packet," class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in the body of the packet, </span></div><div aria-label="toggle video from like altering a recipient's bank account number." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like altering a recipient's bank account number. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-packet-sniffing-can-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Packet sniffing can be passive or active." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packet sniffing can be passive or active. </span></div><div aria-label="toggle video from Passive packet sniffing is a type of" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Passive packet sniffing is a type of </span></div><div aria-label="toggle video from attack where data packets are read in transit." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attack where data packets are read in transit. </span></div><div aria-label="toggle video from Since all the traffic on a network" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Since all the traffic on a network </span></div><div aria-label="toggle video from is visible to any host on the hub," class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is visible to any host on the hub, </span></div><div aria-label="toggle video from malicious actors can view" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors can view </span></div><div aria-label="toggle video from all the information going" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all the information going </span></div><div aria-label="toggle video from in and out of the device they are targeting." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in and out of the device they are targeting. </span></div><div aria-label="toggle video from Thinking back to the example of a letter being delivered," class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Thinking back to the example of a letter being delivered, </span></div><div aria-label="toggle video from we can compare a passive packet sniffing" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we can compare a passive packet sniffing </span></div><div aria-label="toggle video from attack to a postal delivery person" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attack to a postal delivery person </span></div><div aria-label="toggle video from maliciously reading somebody's mail." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maliciously reading somebody's mail. </span></div><div aria-label="toggle video from The postal worker, or packet" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The postal worker, or packet </span></div><div aria-label="toggle video from sniffer, has the right to deliver the mail," class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">sniffer, has the right to deliver the mail, </span></div><div aria-label="toggle video from but not the right to read the information inside." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but not the right to read the information inside. </span></div><div aria-label="toggle video from Active packet sniffing is a type of" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Active packet sniffing is a type of </span></div><div aria-label="toggle video from attack where data packets are manipulated in transit." class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attack where data packets are manipulated in transit. </span></div><div aria-label="toggle video from This may include injecting" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This may include injecting </span></div><div aria-label="toggle video from internet protocols to redirect the packets to" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">internet protocols to redirect the packets to </span></div><div aria-label="toggle video from an unintended port or" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an unintended port or </span></div><div aria-label="toggle video from changing the information the packet contains." class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">changing the information the packet contains. </span></div><div aria-label="toggle video from Active packet sniffing attack would" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Active packet sniffing attack would </span></div><div aria-label="toggle video from be like a neighbor telling the delivery person" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be like a neighbor telling the delivery person </span></div><div aria-label="toggle video from "I'll deliver that mail for you," and then reading the mail" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">"I'll deliver that mail for you," and then reading the mail </span></div><div aria-label="toggle video from or changing the letter before putting it in your mailbox." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or changing the letter before putting it in your mailbox. </span></div><div aria-label="toggle video from Even though your neighbor knows you" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Even though your neighbor knows you </span></div><div aria-label="toggle video from and even if they deliver it to the correct house," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and even if they deliver it to the correct house, </span></div><div aria-label="toggle video from they are actively going out of" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they are actively going out of </span></div><div aria-label="toggle video from their way to engage in malicious behavior." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">their way to engage in malicious behavior. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-good-news-is-tha"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The good news is that" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The good news is that </span></div><div aria-label="toggle video from malicious packet sniffing can be prevented." class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious packet sniffing can be prevented. </span></div><div aria-label="toggle video from Let's look at a few ways" class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's look at a few ways </span></div><div aria-label="toggle video from the network security professional" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network security professional </span></div><div aria-label="toggle video from can prevent these attacks." class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">can prevent these attacks. </span></div><div aria-label="toggle video from One way to protect against" class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One way to protect against </span></div><div aria-label="toggle video from malicious packet sniffing is to use" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious packet sniffing is to use </span></div><div aria-label="toggle video from a VPN to encrypt and protect" class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a VPN to encrypt and protect </span></div><div aria-label="toggle video from data as it travels across the network." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data as it travels across the network. </span></div><div aria-label="toggle video from If you don't remember how VPNs work," class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If you don't remember how VPNs work, </span></div><div aria-label="toggle video from you can revisit the video about" class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you can revisit the video about </span></div><div aria-label="toggle video from this topic in the previous section of the program." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">this topic in the previous section of the program. </span></div><div aria-label="toggle video from When you use a VPN," class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When you use a VPN, </span></div><div aria-label="toggle video from hackers might interfere with your traffic," class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">hackers might interfere with your traffic, </span></div><div aria-label="toggle video from but they won't be able to decode it" class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but they won't be able to decode it </span></div><div aria-label="toggle video from to read it and read your private information." class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to read it and read your private information. </span></div><div aria-label="toggle video from Another way to add a layer of" class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another way to add a layer of </span></div><div aria-label="toggle video from protection against packet sniffing is to make sure" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protection against packet sniffing is to make sure </span></div><div aria-label="toggle video from that websites you have use" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that websites you have use </span></div><div aria-label="toggle video from HTTPS at the beginning of the domain address." class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">HTTPS at the beginning of the domain address. </span></div><div aria-label="toggle video from Previously, we discussed how HTTPS uses SSL/TLS to" class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, we discussed how HTTPS uses SSL/TLS to </span></div><div aria-label="toggle video from encrypt data and prevent eavesdropping" class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encrypt data and prevent eavesdropping </span></div><div aria-label="toggle video from when malicious actors spy on network transmissions." class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">when malicious actors spy on network transmissions. </span></div><div aria-label="toggle video from One final way to help protect yourself against" class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One final way to help protect yourself against </span></div><div aria-label="toggle video from malicious packet sniffing is to" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious packet sniffing is to </span></div><div aria-label="toggle video from avoid using unprotected WiFi." class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">avoid using unprotected WiFi. </span></div><div aria-label="toggle video from You usually find unprotected WiFi in" class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You usually find unprotected WiFi in </span></div><div aria-label="toggle video from public places like coffee shops," class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">public places like coffee shops, </span></div><div aria-label="toggle video from restaurants, or airports." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">restaurants, or airports. </span></div><div aria-label="toggle video from These networks don't use encryption." class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These networks don't use encryption. </span></div><div aria-label="toggle video from This means that anyone on the network can access" class="rc-Phrase css-ugczj4" data-cue="105" data-cue-index="104" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This means that anyone on the network can access </span></div><div aria-label="toggle video from all of the data traveling to and from your device." class="rc-Phrase css-ugczj4" data-cue="106" data-cue-index="105" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all of the data traveling to and from your device. </span></div><div aria-label="toggle video from One precaution you can take is avoiding" class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One precaution you can take is avoiding </span></div><div aria-label="toggle video from free public WiFi unless you have" class="rc-Phrase css-ugczj4" data-cue="108" data-cue-index="107" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">free public WiFi unless you have </span></div><div aria-label="toggle video from a VPN service already installed on your device." class="rc-Phrase css-ugczj4" data-cue="109" data-cue-index="108" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a VPN service already installed on your device. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now-you-know-how-thr"><div aria-label="toggle video from Now you know how threat actors may use" class="rc-Phrase css-ugczj4" data-cue="110" data-cue-index="109" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now you know how threat actors may use </span></div><div aria-label="toggle video from packet sniffing and how to" class="rc-Phrase css-ugczj4" data-cue="111" data-cue-index="110" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packet sniffing and how to </span></div><div aria-label="toggle video from protect a network from these attacks." class="rc-Phrase css-ugczj4" data-cue="112" data-cue-index="111" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protect a network from these attacks. </span></div><div aria-label="toggle video from Let's move on to discuss other network intrusions." class="rc-Phrase css-ugczj4" data-cue="113" data-cue-index="112" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's move on to discuss other network intrusions. </span></div></div>

# IP Spoofing

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-next%2C-let%27s-learn-ab"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Next, let's learn about" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, let's learn about </span></div><div aria-label="toggle video from another kind of network attack called IP spoofing." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another kind of network attack called IP spoofing. </span></div><div aria-label="toggle video from IP spoofing is a network attack" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">IP spoofing is a network attack </span></div><div aria-label="toggle video from performed when an attacker changes the source IP of" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">performed when an attacker changes the source IP of </span></div><div aria-label="toggle video from a data packet to impersonate" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a data packet to impersonate </span></div><div aria-label="toggle video from an authorized system and gain access to a network." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an authorized system and gain access to a network. </span></div><div aria-label="toggle video from In this kind of attack," class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this kind of attack, </span></div><div aria-label="toggle video from the hacker is pretending to be someone they are" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the hacker is pretending to be someone they are </span></div><div aria-label="toggle video from not so they can communicate over" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">not so they can communicate over </span></div><div aria-label="toggle video from the network with the target computer and get" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network with the target computer and get </span></div><div aria-label="toggle video from past firewall rules that may prevent outside traffic." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">past firewall rules that may prevent outside traffic. </span></div><div aria-label="toggle video from Some common IP spoofing attacks are on-path attacks," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some common IP spoofing attacks are on-path attacks, </span></div><div aria-label="toggle video from replay attacks, and smurf attacks." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">replay attacks, and smurf attacks. </span></div><div aria-label="toggle video from Let's discuss these one at a time." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's discuss these one at a time. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-an-on-path-attack-is"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from An on-path attack is" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An on-path attack is </span></div><div aria-label="toggle video from an attack where the malicious actor places themselves in" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an attack where the malicious actor places themselves in </span></div><div aria-label="toggle video from the middle of an authorized connection" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the middle of an authorized connection </span></div><div aria-label="toggle video from and intercepts or alters the data in transit." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and intercepts or alters the data in transit. </span></div><div aria-label="toggle video from On-path attackers gain access to" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">On-path attackers gain access to </span></div><div aria-label="toggle video from the network and put themselves between two devices," class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network and put themselves between two devices, </span></div><div aria-label="toggle video from like a web browser and a web server." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like a web browser and a web server. </span></div><div aria-label="toggle video from Then they sniff the packet" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then they sniff the packet </span></div><div aria-label="toggle video from information to learn the IP and" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">information to learn the IP and </span></div><div aria-label="toggle video from MAC addresses to devices" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">MAC addresses to devices </span></div><div aria-label="toggle video from that are communicating with each other." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that are communicating with each other. </span></div><div aria-label="toggle video from After they have this information," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">After they have this information, </span></div><div aria-label="toggle video from they can pretend to be either of these devices." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they can pretend to be either of these devices. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-another-type-of-atta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another type of attack is a replay attack." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another type of attack is a replay attack. </span></div><div aria-label="toggle video from A replay attack is" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A replay attack is </span></div><div aria-label="toggle video from a network attack performed when" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network attack performed when </span></div><div aria-label="toggle video from a malicious actor intercepts" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a malicious actor intercepts </span></div><div aria-label="toggle video from a data packet in transit and delays" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a data packet in transit and delays </span></div><div aria-label="toggle video from it or repeats it at another time." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it or repeats it at another time. </span></div><div aria-label="toggle video from A delayed packet can cause" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A delayed packet can cause </span></div><div aria-label="toggle video from connection issues between target computers," class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">connection issues between target computers, </span></div><div aria-label="toggle video from or a malicious actor may take" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a malicious actor may take </span></div><div aria-label="toggle video from a network transmission that was sent by" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network transmission that was sent by </span></div><div aria-label="toggle video from an authorized user and repeat it at" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an authorized user and repeat it at </span></div><div aria-label="toggle video from a later time to impersonate the authorized user." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a later time to impersonate the authorized user. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-smurf-attack-is-a-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A smurf attack is a combination of" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A smurf attack is a combination of </span></div><div aria-label="toggle video from a DDoS attack and an IP spoofing attack." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a DDoS attack and an IP spoofing attack. </span></div><div aria-label="toggle video from The attacker sniffs an authorized user's IP address" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The attacker sniffs an authorized user's IP address </span></div><div aria-label="toggle video from and floods it with packets." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and floods it with packets. </span></div><div aria-label="toggle video from current lecture segment: This overwhelms the target computer and can" class="rc-Phrase active css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This overwhelms the target computer and can </span></div><div aria-label="toggle video from bring down a server or the entire network." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">bring down a server or the entire network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now-that-you%27ve-lear"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that you've learned about" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now that you've learned about </span></div><div aria-label="toggle video from different kinds of IP spoofing," class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">different kinds of IP spoofing, </span></div><div aria-label="toggle video from let's talk about how you can protect" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">let's talk about how you can protect </span></div><div aria-label="toggle video from the network from this kind of attack." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network from this kind of attack. </span></div><div aria-label="toggle video from As you previously learned," class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As you previously learned, </span></div><div aria-label="toggle video from encryption should always be implemented so that the data" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encryption should always be implemented so that the data </span></div><div aria-label="toggle video from in your network transfers can't" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in your network transfers can't </span></div><div aria-label="toggle video from be read by malicious actors." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be read by malicious actors. </span></div><div aria-label="toggle video from Firewalls can be configured" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Firewalls can be configured </span></div><div aria-label="toggle video from to protect against IP spoofing." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to protect against IP spoofing. </span></div><div aria-label="toggle video from IP spoofing makes it seem like" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">IP spoofing makes it seem like </span></div><div aria-label="toggle video from the malicious actor is an authorized user" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the malicious actor is an authorized user </span></div><div aria-label="toggle video from by changing the sender's address of" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by changing the sender's address of </span></div><div aria-label="toggle video from the data packet to match the target network's address." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the data packet to match the target network's address. </span></div><div aria-label="toggle video from So if a firewall receives a data packet from the internet" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So if a firewall receives a data packet from the internet </span></div><div aria-label="toggle video from where the sender's IP address" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">where the sender's IP address </span></div><div aria-label="toggle video from is the same as the private network," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is the same as the private network, </span></div><div aria-label="toggle video from then the firewall will deny the transmission" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then the firewall will deny the transmission </span></div><div aria-label="toggle video from since all the devices with that IP address" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">since all the devices with that IP address </span></div><div aria-label="toggle video from should already be on the local network." class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">should already be on the local network. </span></div><div aria-label="toggle video from You can make sure that your firewalls" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You can make sure that your firewalls </span></div><div aria-label="toggle video from configure correctly by creating a rule to" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">configure correctly by creating a rule to </span></div><div aria-label="toggle video from reject all incoming traffic that has" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">reject all incoming traffic that has </span></div><div aria-label="toggle video from the same IP address as the local network." class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the same IP address as the local network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-that%27s-it-for-ip-spo"><div aria-label="toggle video from That's it for IP spoofing." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That's it for IP spoofing. </span></div><div aria-label="toggle video from You've learned how IP spoofing is used in" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You've learned how IP spoofing is used in </span></div><div aria-label="toggle video from some common attacks like on-path attacks," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">some common attacks like on-path attacks, </span></div><div aria-label="toggle video from replay attacks, and smurf attacks." class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">replay attacks, and smurf attacks. </span></div></div>

# Overview of interception tactics

In the previous course items, you learned how packet sniffing and IP spoofing are used in network attacks. Because these attacks intercept data packets as they travel across the network, they are called interception attacks.

This reading will introduce you to some specific attacks that use packet sniffing and IP spoofing. You will learn how hackers use these tactics and how security analysts can counter the threat of interception attacks.

## A closer review of packet sniffing 

As you learned in a previous video, **packet sniffing** is the practice of capturing and inspecting data packets across a network. On a private network, data packets are directed to the matching destination device on the network.

The device’s **Network Interface Card** **(NIC)** is a piece of hardware that connects the device to a network. The NIC reads the data transmission, and if it contains the device’s MAC address, it accepts the packet and sends it to the device to process the information based on the protocol. This occurs in all standard network operations. However, a NIC can be set to promiscuous mode, which means that it accepts all traffic on the network, even the packets that aren’t addressed to the NIC’s device. You’ll learn more about NIC’s later in the program. Malicious actors might use software like Wireshark to capture the data on a private network and store it for later use. They can then use the personal information to their own advantage. Alternatively, they might use the IP and MAC addresses of authorized users of the private network to perform IP spoofing.

## A closer review of IP spoofing 

After a malicious actor has sniffed packets on the network, they can impersonate the IP and MAC addresses of authorized devices to perform an IP spoofing attack. Firewalls can prevent IP spoofing attacks by configuring it to refuse unauthorized IP packets and suspicious traffic. Next, you’ll examine a few common IP spoofing attacks that are important to be familiar with as a security analyst.

### **On-path attack**

An **on-path attack** happens when a hacker intercepts the communication between two devices or servers that have a trusted relationship. The transmission between these two trusted network devices could contain valuable information like usernames and passwords that the malicious actor can collect. An on-path attack is sometimes referred to as a **meddler-in-the middle attack** because the hacker is hiding in the middle of communications between two trusted parties.

Or, it could be that the intercepted transmission contains a DNS system look-up. You’ll recall from an earlier video that a DNS server translates website domain names into IP addresses. If a malicious actor intercepts a transmission containing a DNS lookup, they could spoof the DNS response from the server and redirect a domain name to a different IP address, perhaps one that contains malicious code or other threats. The most important way to protect against an on-path attack is to encrypt your data in transit, e.g. using TLS.

### **Smurf attack**

A **smurf attack** is a network attack that is performed when an attacker sniffs an authorized user’s IP address and floods it with packets. Once the spoofed packet reaches the broadcast address, it is sent to all of the devices and servers on the network.

In a smurf attack, IP spoofing is combined with another denial of service (DoS) technique to flood the network with unwanted traffic. For example, the spoofed packet could include an Internet Control Message Protocol (ICMP) ping. As you learned earlier, ICMP is used to troubleshoot a network. But if too many ICMP messages are transmitted, the ICMP echo responses overwhelm the servers on the network and they shut down. This creates a denial of service and can bring an organization’s operations to a halt.

An important way to protect against a smurf attack is to use an advanced firewall that can monitor any unusual traffic on the network. Most next generation firewalls (NGFW) include features that detect network anomalies to ensure that oversized broadcasts are detected before they have a chance to bring down the network.

### **DoS attack**

As you’ve learned, once the malicious actor has sniffed the network traffic, they can impersonate an authorized user. A **Denial of Service attack** is a class of attacks where the attacker prevents the compromised system from performing legitimate activity or responding to legitimate traffic. Unlike IP spoofing, however, the attacker will not receive a response from the targeted host. Everything about the data packet is authorized including the IP address in the header of the packet. In IP spoofing attacks, the malicious actor uses IP packets containing fake IP addresses. The attackers keep sending IP packets containing fake IP addresses until the network server crashes.

**Pro Tip**: Remember the principle of defense-in-depth. There isn’t one perfect strategy for stopping each kind of attack. You can layer your defense by using multiple strategies. In this case, using industry standard encryption will strengthen your security and help you defend from DoS attacks on more than one level.

## Key takeaways

This reading covered several types of common IP spoofing attacks. You learned about how packet sniffing is performed and how gathering information from intercepting data transmissions can give malicious actors opportunities for IP spoofing. Whether it is an on-path attack, IP spoofing attack, or a smurf attack, analysts need to ensure that mitigation strategies are in place to limit the threat and prevent security breaches.

# Glossary terms from week 3 & wrap-up

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-nice-job-finishing-t"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Nice job finishing this section!" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Nice job finishing this section! </span></div><div aria-label="toggle video from Let's review what you've learned so far." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's review what you've learned so far. </span></div><div aria-label="toggle video from We discussed how to secure networks." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We discussed how to secure networks. </span></div><div aria-label="toggle video from We also learned about network intrusion tactics" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We also learned about network intrusion tactics </span></div><div aria-label="toggle video from like malicious packet sniffing and IP spoofing." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like malicious packet sniffing and IP spoofing. </span></div><div aria-label="toggle video from Finally, we discussed how" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, we discussed how </span></div><div aria-label="toggle video from a security analyst can protect against these attacks." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a security analyst can protect against these attacks. </span></div><div aria-label="toggle video from current lecture segment: You've learned about DoS and DDoS" class="rc-Phrase active css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You've learned about DoS and DDoS </span></div><div aria-label="toggle video from attacks like ICMP flooding, SYN attacks," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attacks like ICMP flooding, SYN attacks, </span></div><div aria-label="toggle video from and the ping of death," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the ping of death, </span></div><div aria-label="toggle video from which try to overwhelming a network by" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which try to overwhelming a network by </span></div><div aria-label="toggle video from flooding it with unwanted data packets." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">flooding it with unwanted data packets. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now%2C-just-think-abou"><div aria-label="toggle video from Now, just think about everything you" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, just think about everything you </span></div><div aria-label="toggle video from know already about network attacks." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">know already about network attacks. </span></div><div aria-label="toggle video from What you've learned in these videos will be" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What you've learned in these videos will be </span></div><div aria-label="toggle video from essential in your work as a security analyst." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential in your work as a security analyst. </span></div><div aria-label="toggle video from Coming up, you'll learn" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, you'll learn </span></div><div aria-label="toggle video from about how security analysts can protect" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">about how security analysts can protect </span></div><div aria-label="toggle video from the network using various security hardening techniques." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network using various security hardening techniques.   
</span></div></div>## Terms and definitions from Course 3, Week 3

**Active packet sniffing:** A type of attack where data packets are manipulated in transit

**Botnet:** A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"

**Denial of service (DoS) attack:** An attack that targets a network or server and floods it with network traffic

**Distributed denial of service (DDoS) attack:** A type of denial or service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic

**Internet Control Message Protocol (ICMP):** An internet protocol used by devices to tell each other about data transmission errors across the network

**Internet Control Message Protocol (ICMP) flood:** A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server

**IP spoofing:** A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

**Network Interface Card (NIC):** Hardware that connects computers to a network

**On-path attack:** An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

**Packet sniffing:** The practice of capturing and inspecting data packets across a network

**Passive packet sniffing:** A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network

**Ping of death:** A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

**Replay attack:** A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

**Smurf attack:** A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets

**Synchronize (SYN) flood attack:** A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets

<div class="phrases" id="bkmrk--1"><div aria-label="toggle video from the network using various security hardening techniques." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">  
</span></div></div>

# Security hardning

# temp

things to review

1. On-path attack
2. Distributed denial of service attack (DDoS)
3. Denial of service attack (DoS)
4. SYN flood attack
5. IP spoofing
6. Packet sniffing

# Introduction to security hardening

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-i-want-to-take-a-mom"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from I want to take a moment to congratulate you on your progress so far." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I want to take a moment to congratulate you on your progress so far. </span></div><div aria-label="toggle video from First, you learned about network operations." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">First, you learned about network operations. </span></div><div aria-label="toggle video from Then, you learned about the tools and" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, you learned about the tools and </span></div><div aria-label="toggle video from protocols that help network systems function." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protocols that help network systems function. </span></div><div aria-label="toggle video from Next, you learned how vulnerabilities in" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, you learned how vulnerabilities in </span></div><div aria-label="toggle video from networks expose them to various security intrusions." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">networks expose them to various security intrusions. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now%2C-we%27ll-discuss-s"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now, we'll discuss security hardening." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, we'll discuss security hardening. </span></div><div aria-label="toggle video from Then, we'll learn about OS hardening, explore network hardening practices, and" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, we'll learn about OS hardening, explore network hardening practices, and </span></div><div aria-label="toggle video from discuss cloud hardening practices." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss cloud hardening practices. </span></div><div aria-label="toggle video from Security hardening can be implemented in devices, networks," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security hardening can be implemented in devices, networks, </span></div><div aria-label="toggle video from applications, and cloud infrastructure." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">applications, and cloud infrastructure. </span></div><div aria-label="toggle video from Security analysts may perform tasks, such as patch updates and" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security analysts may perform tasks, such as patch updates and </span></div><div aria-label="toggle video from current lecture segment: backups, as part of security hardening." class="rc-Phrase active css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">backups, as part of security hardening. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-we%27ll-discuss-these-"><div aria-label="toggle video from We'll discuss these tasks as you progress through the course." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We'll discuss these tasks as you progress through the course. </span></div><div aria-label="toggle video from As a security analyst, hardening will play a major role in your day-to-day tasks," class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, hardening will play a major role in your day-to-day tasks, </span></div><div aria-label="toggle video from which is why it's important for you to understand how it works." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which is why it's important for you to understand how it works. </span></div><div aria-label="toggle video from I'm excited to accompany you on this journey." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm excited to accompany you on this journey. </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">  
</span></div></div># Security hardening

<div class="phrases" id="bkmrk-security-analysts-an"><div aria-label="toggle video from Meet you in the next video." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Security analysts and the organizations they work with have to be" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security analysts and the organizations they work with have to be </span></div><div aria-label="toggle video from proactive about protecting systems from attack." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">proactive about protecting systems from attack. </span></div><div aria-label="toggle video from This is where security hardening comes in." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is where security hardening comes in. </span></div><div aria-label="toggle video from Security hardening is the process of strengthening a system to reduce its" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security hardening is the process of strengthening a system to reduce its </span></div><div aria-label="toggle video from vulnerability and attack surface." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">vulnerability and attack surface. </span></div><div aria-label="toggle video from All the potential vulnerabilities that a threat actor could exploit" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All the potential vulnerabilities that a threat actor could exploit </span></div><div aria-label="toggle video from are referred to as a system's attack surface." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">are referred to as a system's attack surface. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's use an example that compares a network to a house." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's use an example that compares a network to a house. </span></div><div aria-label="toggle video from The attack surface would be all the doors and" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The attack surface would be all the doors and </span></div><div aria-label="toggle video from windows that a robber could use to gain access to that house." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">windows that a robber could use to gain access to that house. </span></div><div aria-label="toggle video from Just like putting locks on all the doors and windows in the house," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like putting locks on all the doors and windows in the house, </span></div><div aria-label="toggle video from security hardening involves minimizing the attack surface or" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security hardening involves minimizing the attack surface or </span></div><div aria-label="toggle video from potential vulnerabilities and keeping a network as secure as possible." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">potential vulnerabilities and keeping a network as secure as possible. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from current lecture segment: As part of security hardening, security analysts perform regular maintenance" class="rc-Phrase active css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As part of security hardening, security analysts perform regular maintenance </span></div><div aria-label="toggle video from procedures to keep network devices and systems functioning securely and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">procedures to keep network devices and systems functioning securely and </span></div><div aria-label="toggle video from optimally." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">optimally. </span></div><div aria-label="toggle video from Security hardening can be conducted on any device or" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security hardening can be conducted on any device or </span></div><div aria-label="toggle video from system that can be compromised, such as hardware, operating systems," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">system that can be compromised, such as hardware, operating systems, </span></div><div aria-label="toggle video from applications, computer networks, and databases." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">applications, computer networks, and databases. </span></div><div aria-label="toggle video from Physical security is also a part of security hardening." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Physical security is also a part of security hardening. </span></div><div aria-label="toggle video from This may include securing a physical space with security cameras and security guards." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This may include securing a physical space with security cameras and security guards. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Some common types of hardening procedures include software updates," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some common types of hardening procedures include software updates, </span></div><div aria-label="toggle video from also called patches, and device application configuration changes." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also called patches, and device application configuration changes. </span></div><div aria-label="toggle video from These updates and changes are done to increase security and" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These updates and changes are done to increase security and </span></div><div aria-label="toggle video from fix security vulnerabilities on a network." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">fix security vulnerabilities on a network. </span></div><div aria-label="toggle video from An example of a security configuration change would be requiring longer" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An example of a security configuration change would be requiring longer </span></div><div aria-label="toggle video from passwords or more frequent password changes." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">passwords or more frequent password changes. </span></div><div aria-label="toggle video from This makes it harder for a malicious actor to gain login credentials." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This makes it harder for a malicious actor to gain login credentials. </span></div><div aria-label="toggle video from An example of a configuration check is updating the encryption standards for" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An example of a configuration check is updating the encryption standards for </span></div><div aria-label="toggle video from data that is stored in a database." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data that is stored in a database. </span></div><div aria-label="toggle video from Keeping encryption up to date makes it harder for" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Keeping encryption up to date makes it harder for </span></div><div aria-label="toggle video from malicious actors to access the database." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors to access the database. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Other examples of security hardening include removing or" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Other examples of security hardening include removing or </span></div><div aria-label="toggle video from disabling unused applications and services, disabling unused ports, and" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">disabling unused applications and services, disabling unused ports, and </span></div><div aria-label="toggle video from reducing access permissions across devices and network." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">reducing access permissions across devices and network. </span></div><div aria-label="toggle video from Minimizing the number of applications, devices, ports, and access permissions" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Minimizing the number of applications, devices, ports, and access permissions </span></div><div aria-label="toggle video from makes network and device monitoring more efficient and reduces the overall attack" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">makes network and device monitoring more efficient and reduces the overall attack </span></div><div aria-label="toggle video from surface, which is one of the best ways to secure an organization." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">surface, which is one of the best ways to secure an organization. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another important strategy for" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another important strategy for </span></div><div aria-label="toggle video from security hardening is to conduct regular penetration testing." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security hardening is to conduct regular penetration testing. </span></div><div aria-label="toggle video from A penetration test, also called a pen test, is a simulated attack that helps identify" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A penetration test, also called a pen test, is a simulated attack that helps identify </span></div><div aria-label="toggle video from vulnerabilities in a system, network, website, application, and process." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">vulnerabilities in a system, network, website, application, and process. </span></div><div aria-label="toggle video from Penetration testers document their findings in a report." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Penetration testers document their findings in a report. </span></div><div aria-label="toggle video from Depending on where the test fails, security teams can determine the type of" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Depending on where the test fails, security teams can determine the type of </span></div><div aria-label="toggle video from security vulnerabilities that require fixing." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security vulnerabilities that require fixing. </span></div><div aria-label="toggle video from Organizations can then review these vulnerabilities and" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Organizations can then review these vulnerabilities and </span></div><div aria-label="toggle video from come up with a plan to fix them." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">come up with a plan to fix them. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases"><div aria-label="toggle video from Coming up, you'll learn more about how security hardening is an essential aspect" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, you'll learn more about how security hardening is an essential aspect </span></div><div aria-label="toggle video from of securing networks." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of securing networks. </span></div><div aria-label="toggle video from It's a foundational part of network security that strengthens" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's a foundational part of network security that strengthens </span></div><div aria-label="toggle video from the network in order to reduce the number of successful attacks." class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network in order to reduce the number of successful attacks. </span></div></div></div></div>

# OS hardening practices

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-hi-there.-in-this-vi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Hi there. In this video," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Hi there. In this video, </span></div><div aria-label="toggle video from we'll discuss operating system, or" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we'll discuss operating system, or </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">OS, hardening and why it's </span></div><div aria-label="toggle video from essential to keep the entire network secure." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential to keep the entire network secure. </span></div><div aria-label="toggle video from The operating system is" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The operating system is </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the interface between computer hardware and the user. </span></div><div aria-label="toggle video from The OS is the first program" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The OS is the first program </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">loaded when a computer turns on. </span></div><div aria-label="toggle video from The OS acts as an intermediary" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The OS acts as an intermediary </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">between software applications and the computer hardware. </span></div><div aria-label="toggle video from It's important to secure the OS in each system" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's important to secure the OS in each system </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">because one insecure OS can </span></div><div aria-label="toggle video from lead to a whole network being compromised." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">lead to a whole network being compromised. </span></div><div aria-label="toggle video from There are many types of operating systems, and they" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are many types of operating systems, and they </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all share similar security hardening practices. </span></div><div aria-label="toggle video from Let's talk about some of" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's talk about some of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">those security hardening practices that </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">are recommended to secure an OS. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-some-os-hardening-ta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Some OS hardening tasks" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some OS hardening tasks </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">are performed at regular intervals, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like updates, backups, and keeping </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an up-to-date list of devices and authorized users. </span></div><div aria-label="toggle video from Other tasks are performed only" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Other tasks are performed only </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">once as part of preliminary safety measures. </span></div><div aria-label="toggle video from Other tasks are performed only" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One example would be configuring </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a device setting to fit a secure encryption standard. </span></div><div aria-label="toggle video from Let's begin with OS hardening tasks" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's begin with OS hardening tasks </span></div><div aria-label="toggle video from that are performed at a regular interval," class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that are performed at a regular interval, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">such as patch installation, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also known as patch updates. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-patch-update-is-a-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A patch update is a software and operating system, or" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A patch update is a software and operating system, or </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">OS, update that addresses </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security vulnerabilities within a program or product. </span></div><div aria-label="toggle video from Now we'll discuss patch updates provided" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now we'll discuss patch updates provided </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to the company by the OS software vendor. </span></div><div aria-label="toggle video from Now we'll discuss patch updates provided" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">With patch updates, the OS should </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be upgraded to its latest software version. </span></div><div aria-label="toggle video from Now we'll discuss patch updates provided" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Sometimes patches are released </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to fix a security vulnerability in the software. </span></div><div aria-label="toggle video from As soon as OS vendors publish" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As soon as OS vendors publish </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a patch and the vulnerability fix, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors know exactly where </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the vulnerability is in systems </span></div><div aria-label="toggle video from running the out-of-date OS." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">running the out-of-date OS. </span></div><div aria-label="toggle video from This is why it's important for organizations to run" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is why it's important for organizations to run </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">patch updates as soon as they are released. </span></div><div aria-label="toggle video from For example, my team" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, my team </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">had to perform an emergency patch to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">address a recent vulnerability </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">found in a commonly used programming library. </span></div><div aria-label="toggle video from The library is used almost everywhere," class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The library is used almost everywhere, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so we had to quickly patch most of our servers and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">applications to fix the vulnerability. </span></div><div aria-label="toggle video from The newly updated OS should be" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The newly updated OS should be </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">added to the baseline configuration, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also called the baseline image. </span></div><div aria-label="toggle video from A baseline configuration is a documented set of" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A baseline configuration is a documented set of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">specifications within a system </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that is used as a basis for future builds,</span></div><div aria-label="toggle video from releases, and updates." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">releases, and updates. </span></div><div aria-label="toggle video from For example, a baseline may contain" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, a baseline may contain </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a firewall rule with a list of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allowed and disallowed network ports. </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If a security team suspects </span></div><div aria-label="toggle video from unusual activity affecting the OS," class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">unusual activity affecting the OS, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they can compare the current configuration to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the baseline and make sure that nothing has been changed. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-another-hardening-ta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another hardening task performed regularly is" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another hardening task performed regularly is </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">hardware and software disposal. </span></div><div aria-label="toggle video from Another hardening task performed regularly is" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This ensures that all old hardware </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is properly wiped and disposed of. </span></div><div aria-label="toggle video from Another hardening task performed regularly is" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's also a good idea to delete </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">any unused software applications since </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">some popular programming languages </span></div><div aria-label="toggle video from have known vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">have known vulnerabilities. </span></div><div aria-label="toggle video from Removing unused software makes sure that there aren't" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Removing unused software makes sure that there aren't </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">any unnecessary vulnerabilities connected </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with the programs that the software uses. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-final-os-hardeni"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The final OS hardening technique that we'll" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The final OS hardening technique that we'll </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss is implementing a strong password policy. </span></div><div aria-label="toggle video from Strong password policies require" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Strong password policies require </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that passwords follow specific rules. </span></div><div aria-label="toggle video from For example, an organization may set" class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, an organization may set </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a password policy that requires </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a minimum of eight characters, </span></div><div aria-label="toggle video from a capital letter, a number, and a symbol." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a capital letter, a number, and a symbol. </span></div><div aria-label="toggle video from To discourage malicious actors," class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To discourage malicious actors, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a password policy usually </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">states that a user will lose access to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network after entering </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the wrong password a certain number of times in a row. </span></div><div aria-label="toggle video from Some systems also require" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some systems also require </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">multi-factor authentication, or MFA. </span></div><div aria-label="toggle video from Some systems also require" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">MFA is a security measure </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which requires a user to verify their identity in </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">two or more ways to access a system or network. </span></div><div aria-label="toggle video from Ways of identifying yourself include" class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Ways of identifying yourself include </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">something you know, like a password, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">something you have like an ID card, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or something unique about you, like your fingerprint. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-to-review%2C-os-harden"><div aria-label="toggle video from To review, OS hardening is a set of procedures that" class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">To review, OS hardening is a set of procedures that </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maintains OS security and improves it. </span></div><div aria-label="toggle video from To review, OS hardening is a set of procedures that" class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security measures like </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">access privileges and password policies </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">frequently undergo regular security checks </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">as part of OS hardening. </span></div><div aria-label="toggle video from Coming up, we'll discuss network hardening practices." class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll discuss network hardening practices. </span></div></div>

# Brute force attacks and OS hardening

In this reading, you’ll learn about brute force attacks. You’ll consider how vulnerabilities can be assessed using virtual machines and sandboxes, and learn ways to prevent brute force attacks using a combination of authentication measures. Implementing various OS hardening tasks can help prevent brute force attacks. An attacker can use a brute force attack to gain access and compromise a network.

Usernames and passwords are among the most common and important security controls in place today. They are used and enforced on everything that stores or accesses sensitive or private information, like personal phones, computers, and restricted applications within an organization. However, a major issue with relying on login credentials as a critical line of defense is that they’re vulnerable to being stolen and guessed by malicious actors.

## Brute force attacks

A **brute force attack** is a trial-and-error process of discovering private information. There are different types of brute force attacks that malicious actors use to guess passwords, including:

<div class="css-jgflq0" id="bkmrk-simple-brute-force-a"><div><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- *Simple brute force attacks.* When attackers try to guess a user's login credentials, it’s considered a simple brute force attack. They might do this by entering any combination of usernames and passwords that they can think of until they find the one that works.
- *Dictionary attacks* use a similar technique. In dictionary attacks, attackers use a list of commonly used passwords and stolen credentials from previous breaches to access a system. These are called “dictionary” attacks because attackers originally used a list of words from the dictionary to guess the passwords, before complex password rules became a common security practice.

</div></div></div></div></div></div></div>Using brute force to access a system can be a tedious and time consuming process, especially when it’s done manually. There are a range of tools attackers use to conduct their attacks.

## Assessing vulnerabilities

Before a brute force attack or other cybersecurity incident occurs, companies can run a series of tests on their network or web applications to assess vulnerabilities. Analysts can use virtual machines and sandboxes to test suspicious files, check for vulnerabilities before an event occurs, or to simulate a cybersecurity incident.

### **Virtual machines (VMs)**

Virtual machines (VMs) are software versions of physical computers. VMs provide an additional layer of security for an organization because they can be used to run code in an isolated environment, preventing malicious code from affecting the rest of the computer or system. VMs can also be deleted and replaced by a pristine image after testing malware.

VMs are useful when investigating potentially infected machines or running malware in a constrained environment. Using a VM may prevent damage to your system in the event its tools are used improperly. VMs also give you the ability to revert to a previous state. However, there are still some risks involved with VMs. There’s still a small risk that a malicious program can escape virtualization and access the host machine.

You can test and explore applications easily with VMs, and it’s easy to switch between different VMs from your computer. This can also help in streamlining many security tasks.

### **Sandbox environments**

A sandbox is a type of testing environment that allows you to execute software or programs separate from your network. They are commonly used for testing patches, identifying and addressing bugs, or detecting cybersecurity vulnerabilities. Sandboxes can also be used to evaluate suspicious software, evaluate files containing malicious code, and simulate attack scenarios.

Sandboxes can be stand-alone physical computers that are not connected to a network; however, it is often more time- and cost-effective to use software or cloud-based virtual machines as sandbox environments. Note that some malware authors know how to write code to detect if the malware is executed in a VM or sandbox environment. Attackers can program their malware to behave as harmless software when run inside these types of testing environments.

## Prevention measures

Some common measures organizations use to prevent brute force attacks and similar attacks from occurring include:

<div class="css-jgflq0" id="bkmrk-salting-and-hashing%3A"><div><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Salting and hashing:** Hashing converts information into a unique value that can then be used to determine its integrity. It is a one-way function, meaning it is impossible to decrypt and obtain the original text. Salting adds random characters to hashed passwords. This increases the length and complexity of hash values, making them more secure.
- **Multi-factor authentication (MFA) and two-factor authentication (2FA):** MFA is a security measure which requires a user to verify their identity in two or more ways to access a system or network. This verification happens using a combination of authentication factors: a username and password, fingerprints, facial recognition, or a one-time password (OTP) sent to a phone number or email. 2FA is similar to MFA, except it uses only two forms of verification.
- **CAPTCHA and reCAPTCHA:** CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It asks users to complete a simple test that proves they are human. This helps prevent software from trying to brute force a password. reCAPTCHA is a free CAPTCHA service from Google that helps protect websites from bots and malicious software.
- **Password policies:** Organizations use password policies to standardize good password practices throughout the business. Policies can include guidelines on how complex a password should be, how often users need to update passwords, and if there are limits to how many times a user can attempt to log in before their account is suspended.

</div></div></div></div></div></div></div>## Key takeaways

Brute force attacks are a trial-and-error process of guessing passwords. Attacks can be launched manually or through software tools. Methods include simple brute force attacks and dictionary attacks. To protect against brute force attacks, cybersecurity analysts can use sandboxes to test suspicious files, check for vulnerabilities, or to simulate real attacks and virtual machines to conduct vulnerability tests. Some common measures to prevent brute force attacks include: hashing and salting, MFA and/or 2FA, CAPTCHA and reCAPTCHA, and password policies.

# Network hardening practices

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-earlier%2C-you-learned"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Earlier, you learned that OS hardening focuses" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Earlier, you learned that OS hardening focuses </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on device safety and uses patch updates, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">secure configuration, and account access policies. </span></div><div aria-label="toggle video from Now we'll focus on network hardening." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now we'll focus on network hardening. </span></div><div aria-label="toggle video from Network hardening focuses" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network hardening focuses </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on network-related security hardening, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like port filtering, network access privileges, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and encryption over networks. </span></div><div aria-label="toggle video from Certain network hardening tasks are performed regularly," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Certain network hardening tasks are performed regularly, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">while others are performed </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">once and then updated as needed. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-some-tasks-that-are-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Some tasks that are regularly" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some tasks that are regularly </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">performed are firewall rules maintenance, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network log analysis, patch updates, and server backups. </span></div><div aria-label="toggle video from Earlier, you learned that a log is a record of" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Earlier, you learned that a log is a record of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">events that occurs within an organization's systems. </span></div><div aria-label="toggle video from Network log analysis is the process of" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network log analysis is the process of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">examining network logs to identify events of interest. </span></div><div aria-label="toggle video from Security teams use a log analyzer tool" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security teams use a log analyzer tool </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a security information and event management tool, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">also known as a SIEM, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to conduct network log analysis. </span></div><div aria-label="toggle video from A SIEM tool is an application that collects and analyzes" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A SIEM tool is an application that collects and analyzes </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">log data to monitor </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">critical activities in an organization. </span></div><div aria-label="toggle video from It gathers security data from a network and" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It gathers security data from a network and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">presents that data on a single dashboard. </span></div><div aria-label="toggle video from It gathers security data from a network and" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The dashboard interface is sometimes </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">called a single pane of glass. </span></div><div aria-label="toggle video from A SIEM helps analysts to inspect, analyze," class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A SIEM helps analysts to inspect, analyze, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and react to security events </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">across the network based on their priority. </span></div><div aria-label="toggle video from Reports from the SIEM provide a list of" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Reports from the SIEM provide a list of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">new or ongoing network vulnerabilities </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and list them on a scale </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of priority from high to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">low, where high priority vulnerabilities </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">have a much shorter deadline for mitigation. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now-that-we%27ve-cover"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that we've covered tasks" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now that we've covered tasks </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that are performed regularly, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">let's examine tasks that are performed once. </span></div><div aria-label="toggle video from These tasks include port filtering on firewalls," class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These tasks include port filtering on firewalls, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network access privileges, and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encryption for communication, among many things. </span></div><div aria-label="toggle video from Let's start with port filtering." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's start with port filtering. </span></div><div aria-label="toggle video from Port filtering can be formed over the network." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Port filtering can be formed over the network. </span></div><div aria-label="toggle video from Port filtering is a firewall function that blocks or" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Port filtering is a firewall function that blocks or </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">allows certain port numbers </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to limit unwanted communication. </span></div><div aria-label="toggle video from A basic principle is that" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A basic principle is that </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the only ports that are </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">needed are the ones that are allowed. </span></div><div aria-label="toggle video from A basic principle is that" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Any port that isn't being used by </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the normal network operations should be disallowed. </span></div><div aria-label="toggle video from This protects against port vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This protects against port vulnerabilities. </span></div><div aria-label="toggle video from Networks should be set up with" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Networks should be set up with </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the most up-to-date wireless protocols </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">available and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">older wireless protocols should be disabled. </span></div><div aria-label="toggle video from Security analysts also use" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Security analysts also use </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network segmentation to create </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">isolated subnets for </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">different departments in an organization. </span></div><div aria-label="toggle video from For example, they might make one for" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, they might make one for </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the marketing department and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">one for the finance department. </span></div><div aria-label="toggle video from This is done so the issues in" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is done so the issues in </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">each subnet don't spread across the whole company and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">only specified users are given access to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the part of the network that they require for their role. </span></div><div aria-label="toggle video from Network segmentation may also be used" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Network segmentation may also be used </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to separate different security zones. </span></div><div aria-label="toggle video from Any restricted zone on a network containing" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Any restricted zone on a network containing </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">highly classified or confidential data </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">should be separate from the rest of the network. </span></div><div aria-label="toggle video from Any restricted zone on a network containing" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Lastly, all network communication should be </span></div><div aria-label="toggle video from encrypted using the latest encryption standards." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encrypted using the latest encryption standards. </span></div><div aria-label="toggle video from Encryption standards are rules or methods used to" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Encryption standards are rules or methods used to </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">conceal outgoing data and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">uncover or decrypt incoming data. </span></div><div aria-label="toggle video from Data in restricted zones should" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Data in restricted zones should </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">have much higher encryption standards, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which makes them more difficult to access. </span></div><div aria-label="toggle video from which makes them more difficult to access." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"></div></div></div></div><div class="phrases" id="bkmrk-you%27ve-learned-about"><div aria-label="toggle video from You've learned about the most common hardening practices." class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You've learned about the most common hardening practices. </span></div><div aria-label="toggle video from This knowledge will be useful as you complete" class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This knowledge will be useful as you complete </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the certificate program and it's </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential to your career as a security analyst. </span></div></div>

# Network security applications

This section of the course covers the topic of network hardening and monitoring. Each device, tool, or security strategy put in place by security analysts further protects—or hardens—the network until the network owner is satisfied with the level of security. This approach of adding layers of security to a network is referred to as defense in depth.

In this reading, you are going to learn about the role of four devices used to secure a network—firewalls, intrusion detection systems, intrusion prevention systems, and security incident and event management tools. Network security professionals have the choice to use any or all of these devices and tools depending on the level of security that they hope to achieve.

This reading will discuss the benefits of layered security. Each tool mentioned is an additional layer of defense that can incrementally harden a network, starting with the minimum level of security (provided by just a firewall), to the highest level of security (provided by combining a firewall, an intrusion detection and prevention device, and security event monitoring).

<div class="rc-CML" dir="auto" id="bkmrk-"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![An image showing the differences between a firewall, IPS, and IDS.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/4ENRXSswQSOsOrKt9KyG6A_06fe04a8d10846ba811fe89a969642f1_CS_R-055_Firewall-IDS-and-IPS.png?expiry=1688515200000&hmac=KZ9paHnlkEH_mrCOrvOnaG3JY3NECOgfDT6mRKV35NI)</figure></div></div></div></div></div></div>Take note of where each tool is located on the network. Each tool has its own place in the network’s architecture. Security analysts are required to understand the network topologies shown in the diagrams throughout this reading.

## Firewall

So far in this course, you learned about stateless firewalls, stateful firewalls, and next-generation firewalls (NGFWs), and the security advantages of each of them.

Most firewalls are similar in their basic functions. Firewalls allow or block traffic based on a set of rules. As data packets enter a network, the packet header is inspected and allowed or denied based on its port number. NGFWs are also able to inspect packet payloads. Each system should have its own firewall, regardless of the network firewall.

<div class="rc-CML" dir="auto" id="bkmrk--1"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![A firewall circled by dashes, protecting the internal network from internet traffic that comes in through the mode.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/dSLcIcXBSw-kw-9kzEwhAw_284c8540dab14a9e911296471c71d2f1_CS_R-055_Firewall.png?expiry=1688515200000&hmac=xL2jtZzaVbs_85VeYYEsfqEb3FSr8-LKOztKwacu2gY)</figure></div></div></div></div></div></div>## Intrusion Detection System

An **intrusion detection system** (IDS) is an application that monitors system activity and alerts on possible intrusions. An IDS alerts administrators based on the signature of malicious traffic.

The IDS is configured to detect known attacks. IDS systems often sniff data packets as they move across the network and analyze them for the characteristics of known attacks. Some IDS systems review not only for signatures of known attacks, but also for anomalies that could be the sign of malicious activity. When the IDS discovers an anomaly, it sends an alert to the network administrator who can then investigate further.

The limitations to IDS systems are that they can only scan for known attacks or obvious anomalies. New and sophisticated attacks might not be caught. The other limitation is that the IDS doesn’t actually stop the incoming traffic if it detects something awry. It’s up to the network administrator to catch the malicious activity before it does anything damaging to the network.

<div class="rc-CML" dir="auto" id="bkmrk--2"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![An IDS circled above an image of a switch, which rests between a firewall and the network.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/5hPelJ74TwaKusUY4ZEkkQ_bcd56306ce904397a352cfe37e28b6f1_CS_R-055_IDS.png?expiry=1688515200000&hmac=hLXiCBKbq4PntTA-Z5YyH8rOsFKGqlX7yfpznLlTfB8)</figure></div></div></div></div></div></div>When combined with a firewall, an IDS adds another layer of defense. The IDS is placed behind the firewall and before entering the LAN, which allows the IDS to analyze data streams after network traffic that is disallowed by the firewall has been filtered out. This is done to reduce noise in IDS alerts, also referred to as false positives.

## Intrusion Prevention System

An **intrusion prevention system (IPS)** is an application that monitors system activity for intrusive activity and takes action to stop the activity. It offers even more protection than an IDS because it actively stops anomalies when they are detected, unlike the IDS that simply reports the anomaly to a network administrator.

An IPS searches for signatures of known attacks and data anomalies. An IPS reports the anomaly to security analysts and blocks a specific sender or drops network packets that seem suspect.

<div class="rc-CML" dir="auto" id="bkmrk--3"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![An IPS is situated between a firewall and the internal network.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/sp1NiS2HR3KoLCBP36lq3g_f612a9b5e6cc47b2a9341208200b3ff1_CS_R-055_IPS.png?expiry=1688515200000&hmac=QJLIFnhC4mXDWcmPES8VjFeg_ufO39Ixa8gwdtKyr_g)</figure></div></div></div></div></div></div>The IPS (like an IDS) sits behind the firewall in the network architecture. This offers a high level of security because risky data streams are disrupted before they even reach sensitive parts of the network. However, one potential limitation is that it is inline: If it breaks, the connection between the private network and the internet breaks. Another limitation of IPS is the possibility of false positives, which can result in legitimate traffic getting dropped.

## Full packet capture devices

Full packet capture devices can be incredibly useful for network administrators and security professionals. These devices allow you to record and analyze all of the data that is transmitted over your network. They also aid in investigating alerts created by an IDS.

## Security Information and Event Management

A **security information and event management system (SIEM)** is an application that collects and analyzes log data to monitor critical activities in an organization. SIEM tools work in real time to report suspicious activity in a centralized dashboard. SIEM tools additionally analyze network log data sourced from IDSs, IPSs, firewalls, VPNs, proxies, and DNS logs. SIEM tools are a way to aggregate security event data so that it all appears in one place for security analysts to analyze. This is referred to as a single pane of glass.

Below, you can review an example of a dashboard from Google Cloud’s SIEM tool, Chronicle. **Chronicle** is a cloud-native tool designed to retain, analyze, and search data.

<div class="rc-CML" dir="auto" id="bkmrk--4"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div><figure contenteditable="false" role="figure">![Image of the Chronicle dashboard](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/sTtz1jL8QzCTVyhfvICu1A_ee623d56206843d6823598a8f0e70ef1_eyi2ksdTfw4mJcwZ6NvBKQBg-7CVFr-2tq8qNBLlVbloMUlJsvGdPwkSGEk-5VnBU3eXxe9dF7mGPjvyN2T3nWNKtXtu19K2Ycnbt_rEE5FAE4rbNvixbF_oeU82PyiZWpEVVoTqMf6eQJWl7uRMQyvIWA94vNp88ew46W52Kh7QkFeihWUfB8cQkB5dI5c?expiry=1688515200000&hmac=o0OzpCnZFRM68zzYEnI0Zoz1V2DGejD8dH7BimbXHa4)</figure></div></div></div></div></div></div>**Splunk** is another common SIEM tool. Splunk offers different SIEM tool options: Splunk Enterprise and Splunk Cloud. Both options include detailed dashboards which help security professionals to review and analyze an organization's data. There are also other similar SIEM tools available, and it's important for security professionals to research the different tools to determine which one is most beneficial to the organization.

A SIEM tool doesn’t replace the expertise of security analysts, or of the network- and system-hardening activities covered in this course, but they’re used in combination with other security methods. Security analysts often work in a Security Operations Center (SOC) where they can monitor the activity across the network. They can then use their expertise and experience to determine how to respond to the information on the dashboard and decide when the events meet the criteria to be escalated to oversight.

## Key takeaways

<div class="rc-CML" dir="auto" id="bkmrk-devices-%2F-tools-adva"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer"><div class="css-1yr0py9"><table><thead><tr><th scope="col">**Devices / Tools**

</th><th scope="col">**Advantages**

</th><th scope="col">**Disadvantages**

</th></tr></thead><tbody><tr><td>Firewall

</td><td>A firewall allows or blocks traffic based on a set of rules.

</td><td>A firewall is only able to filter packets based on information provided in the header of the packets.

</td></tr><tr><td>Intrusion Detection System (IDS)

</td><td>An IDS detects and alerts admins about possible intrusions, attacks, and other malicious traffic.

</td><td>An IDS can only scan for known attacks or obvious anomalies; new and sophisticated attacks might not be caught. It doesn’t actually stop the incoming traffic.

</td></tr><tr><td>Intrusion Prevention System (IPS)

</td><td>An IPS monitors system activity for intrusions and anomalies and takes action to stop them.

</td><td>An IPS is an inline appliance. If it fails, the connection between the private network and the internet breaks. It might detect false positives and block legitimate traffic.

</td></tr><tr><td>Security Information and Event Management (SIEM)

</td><td>A SIEM tool collects and analyzes log data from multiple network machines. It aggregates security events for monitoring in a central dashboard.

</td><td>A SIEM tool only reports on possible security issues. It does not take any actions to stop or prevent suspicious events.

</td></tr></tbody></table>

</div></div></div></div></div></div>Each of these devices or tools cost money to purchase, install, and maintain. An organization might need to hire additional personnel to monitor the security tools, as in the case of a SIEM. Decision-makers are tasked with selecting the appropriate level of security based on cost and risk to the organization. You will learn more about choosing levels of security later in the course.

# Kelsey: Cloud security explained

<div aria-label="toggle video from [MUSIC]" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" id="bkmrk-" role="button">  
</div><div aria-label="toggle video from I'm Kelsey, I'm a distinguished engineer at Google Cloud." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" id="bkmrk-i%27m-kelsey%2C-i%27m-a-di" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm Kelsey, I'm a distinguished engineer at Google Cloud. </span></div><div aria-label="toggle video from current lecture segment: I work on compute platforms and security related topics." class="rc-Phrase active css-ugczj4" data-cue="3" data-cue-index="2" id="bkmrk-i-work-on-compute-pl" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I work on compute platforms and security related topics. </span></div><div aria-label="toggle video from When I was starting, the only jobs I had previous," class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" id="bkmrk-when-i-was-starting%2C" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When I was starting, the only jobs I had previous, </span></div><div aria-label="toggle video from the only jobs I was confident were accessible to me were fast food jobs." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" id="bkmrk-the-only-jobs-i-was-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the only jobs I was confident were accessible to me were fast food jobs. </span></div><div aria-label="toggle video from I wanted a career, I wanted more than just a job." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" id="bkmrk-i-wanted-a-career%2C-i" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I wanted a career, I wanted more than just a job. </span></div><div aria-label="toggle video from So when I zoomed out and asked myself, what were my career options?" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" id="bkmrk-so-when-i-zoomed-out" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So when I zoomed out and asked myself, what were my career options? </span></div><div aria-label="toggle video from I couldn't think of a better place in the year 1999 than going into the world" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" id="bkmrk-i-couldn%27t-think-of-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I couldn't think of a better place in the year 1999 than going into the world </span></div><div aria-label="toggle video from of technologies." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" id="bkmrk-of-technologies." role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of technologies. </span></div><div aria-label="toggle video from I mean, on the news people were lining up for the latest operating system." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" id="bkmrk-i-mean%2C-on-the-news-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I mean, on the news people were lining up for the latest operating system. </span></div><div aria-label="toggle video from All the tech people were the new rock stars." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" id="bkmrk-all-the-tech-people-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All the tech people were the new rock stars. </span></div><div aria-label="toggle video from And I remember flipping through the opening jobs or" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" id="bkmrk-and-i-remember-flipp" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And I remember flipping through the opening jobs or </span></div><div aria-label="toggle video from the job openings in the classified section, and it said anyone that has one" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" id="bkmrk-the-job-openings-in-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the job openings in the classified section, and it said anyone that has one </span></div><div aria-label="toggle video from of these certifications let us know because we're hiring." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" id="bkmrk-of-these-certificati" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of these certifications let us know because we're hiring. </span></div><div aria-label="toggle video from The delta between getting started and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" id="bkmrk-the-delta-between-ge" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The delta between getting started and </span></div><div aria-label="toggle video from getting your first job into that career that I always wanted," class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" id="bkmrk-getting-your-first-j" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">getting your first job into that career that I always wanted, </span></div><div aria-label="toggle video from it was $35 away in a certification book." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" id="bkmrk-it-was-%2435-away-in-a" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it was $35 away in a certification book. </span></div><div aria-label="toggle video from So let's talk about Cloud." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" id="bkmrk-so-let%27s-talk-about-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So let's talk about Cloud. </span></div><div aria-label="toggle video from So before the time of Cloud, most companies had their own data center." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" id="bkmrk-so-before-the-time-o" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So before the time of Cloud, most companies had their own data center. </span></div><div aria-label="toggle video from Imagine it's just you alone in your house, you can put anything wherever you want." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" id="bkmrk-imagine-it%27s-just-yo" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Imagine it's just you alone in your house, you can put anything wherever you want. </span></div><div aria-label="toggle video from You may choose to never lock the doors on the inside, it's just you." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" id="bkmrk-you-may-choose-to-ne" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You may choose to never lock the doors on the inside, it's just you. </span></div><div aria-label="toggle video from And for a long time in our industry," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" id="bkmrk-and-for-a-long-time-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And for a long time in our industry, </span></div><div aria-label="toggle video from that's the way people ran their data centers." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" id="bkmrk-that%27s-the-way-peopl" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that's the way people ran their data centers. </span></div><div aria-label="toggle video from Now, we just call that private Cloud, it's just you there." class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" id="bkmrk-now%2C-we-just-call-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, we just call that private Cloud, it's just you there. </span></div><div aria-label="toggle video from But Cloud is public." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" id="bkmrk-but-cloud-is-public." role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But Cloud is public. </span></div><div aria-label="toggle video from And so the analogy would be, imagine getting roommates," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" id="bkmrk-and-so-the-analogy-w" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And so the analogy would be, imagine getting roommates, </span></div><div aria-label="toggle video from now you start to think differently about your stuff." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" id="bkmrk-now-you-start-to-thi" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">now you start to think differently about your stuff. </span></div><div aria-label="toggle video from You start to lock things up even while you're inside of the house, and" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" id="bkmrk-you-start-to-lock-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You start to lock things up even while you're inside of the house, and </span></div><div aria-label="toggle video from your security discipline is going to be very different." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" id="bkmrk-your-security-discip" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">your security discipline is going to be very different. </span></div><div aria-label="toggle video from As more and more companies move into Cloud." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" id="bkmrk-as-more-and-more-com" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As more and more companies move into Cloud. </span></div><div aria-label="toggle video from You may just be the person who can help one of those organizations finally make" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" id="bkmrk-you-may-just-be-the-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You may just be the person who can help one of those organizations finally make </span></div><div aria-label="toggle video from that leap because they have a professional on their team." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" id="bkmrk-that-leap-because-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that leap because they have a professional on their team. </span></div><div aria-label="toggle video from All right, so you've gotten the certification," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" id="bkmrk-all-right%2C-so-you%27ve" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">All right, so you've gotten the certification, </span></div><div aria-label="toggle video from you've gotten the fundamental skills," class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" id="bkmrk-you%27ve-gotten-the-fu" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you've gotten the fundamental skills, </span></div><div aria-label="toggle video from how do you make sure that you can actually use them in the Cloud?" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" id="bkmrk-how-do-you-make-sure" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">how do you make sure that you can actually use them in the Cloud? </span></div><div aria-label="toggle video from I'm going to let you in a little secret." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" id="bkmrk-i%27m-going-to-let-you" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm going to let you in a little secret. </span></div><div aria-label="toggle video from Go use the Cloud." class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" id="bkmrk-go-use-the-cloud." role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Go use the Cloud. </span></div><div aria-label="toggle video from Go take existing software, throw it in the Cloud, and" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" id="bkmrk-go-take-existing-sof" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Go take existing software, throw it in the Cloud, and </span></div><div aria-label="toggle video from find all the tools that poke and prod at the thing you just got running and" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" id="bkmrk-find-all-the-tools-t" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">find all the tools that poke and prod at the thing you just got running and </span></div><div aria-label="toggle video from it's going to tell you where you're weak." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" id="bkmrk-it%27s-going-to-tell-y" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it's going to tell you where you're weak. </span></div><div aria-label="toggle video from Learn those tools, because those are the tools that the professionals use." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" id="bkmrk-learn-those-tools%2C-b" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Learn those tools, because those are the tools that the professionals use. </span></div><div aria-label="toggle video from Learning is a superpower." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" id="bkmrk-learning-is-a-superp" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Learning is a superpower. </span></div><div aria-label="toggle video from It gives you the ability to not only get that job that you've been looking at," class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" id="bkmrk-it-gives-you-the-abi" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It gives you the ability to not only get that job that you've been looking at, </span></div><div aria-label="toggle video from but it also gives you the ability to define the next one." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" id="bkmrk-but-it-also-gives-yo" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but it also gives you the ability to define the next one. </span></div>

# Security hardening Wrap-up & Glossary terms from week 4

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-great-work-on-learni"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Great work on learning about security hardening!" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Great work on learning about security hardening! </span></div><div aria-label="toggle video from Let's take a few minutes to wrap up what you've learned." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's take a few minutes to wrap up what you've learned. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-you-learned-about-se"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from You learned about security hardening and" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You learned about security hardening and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">its importance to an organization's infrastructure. </span></div><div aria-label="toggle video from First, we discussed how" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">First, we discussed how </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">security hardening strengthens systems and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">networks to reduce the likelihood of an attack. </span></div><div aria-label="toggle video from current lecture segment: Next, we covered the importance of OS hardening," class="rc-Phrase active css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, we covered the importance of OS hardening, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">including patch updates, baseline configurations, </span></div><div aria-label="toggle video from and hardware and software disposal." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and hardware and software disposal. </span></div><div aria-label="toggle video from Then we explored network hardening practices, such as" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then we explored network hardening practices, such as </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network log analysis and firewall rule maintenance. </span></div><div aria-label="toggle video from Finally, we examined cloud" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, we examined cloud </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">network hardening and the responsibilities of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">both organizations and </span></div><div aria-label="toggle video from cloud service providers in maintaining security." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cloud service providers in maintaining security. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-as-a-security-analys"><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you'll be working with operating systems, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on-premise networks, and cloud networks. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You'll be using all the knowledge that we learned in </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">this section in your career as a security analyst.</span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0">  
</div></div>#   


## **Terms and definitions from Course 3, Week 4**

**Baseline configuration (baseline image):** A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

**Hardware:** The physical components of a computer

**Multi-factor authentication (MFA):** A security measure which requires a user to verify their identity in two or more ways to access a system or network

**Network log analysis:** The process of examining network logs to identify events of interest

**Operating system (OS):** The interface between computer hardware and the user

**Patch update:** A software and operating system update that addresses security vulnerabilities within a program or product

**Penetration testing (pen test):** A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

**Principle of least privilege:** Access and authorization to information only last long enough to complete a task

**Security hardening:** The process of strengthening a system to reduce its vulnerabilities and attack surface

**Security information and event management (SIEM):** An application that collects and analyzes log data to monitors critical activities for an organization

**World-writable file:** A file that can be altered by anyone in the world

# Cloud Hardening

## Network security in the cloud 

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-recent-years%2C-man"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In recent years, many organizations are using network services in the cloud." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In recent years, many organizations are using network services in the cloud. </span></div><div aria-label="toggle video from So in addition to securing on-premises networks," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So in addition to securing on-premises networks, </span></div><div aria-label="toggle video from a security analyst will need to secure cloud networks." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a security analyst will need to secure cloud networks. </span></div><div aria-label="toggle video from In a previous video, you learned that a cloud network is a collection of" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In a previous video, you learned that a cloud network is a collection of </span></div><div aria-label="toggle video from servers or computers that stores resources and" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">servers or computers that stores resources and </span></div><div aria-label="toggle video from data in a remote data center that can be accessed via the internet." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data in a remote data center that can be accessed via the internet. </span></div><div aria-label="toggle video from They can host company data and applications using cloud computing to" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They can host company data and applications using cloud computing to </span></div><div aria-label="toggle video from provide on-demand storage, processing power, and data analytics." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">provide on-demand storage, processing power, and data analytics. </span></div><div aria-label="toggle video from Just like regular web servers, cloud servers also require proper maintenance" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like regular web servers, cloud servers also require proper maintenance </span></div><div aria-label="toggle video from done through various security hardening procedures." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">done through various security hardening procedures. </span></div><div aria-label="toggle video from Although cloud servers are hosted by a cloud service provider," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Although cloud servers are hosted by a cloud service provider, </span></div><div aria-label="toggle video from these providers cannot prevent intrusions in the" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">these providers cannot prevent intrusions in the </span></div><div aria-label="toggle video from cloud—especially intrusions from malicious actors, both internal and" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">cloud—especially intrusions from malicious actors, both internal and </span></div><div aria-label="toggle video from external to an organization." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">external to an organization. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-one-distinction-betw"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from One distinction between cloud network hardening and" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One distinction between cloud network hardening and </span></div><div aria-label="toggle video from traditional network hardening is the use of a server baseline image for" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">traditional network hardening is the use of a server baseline image for </span></div><div aria-label="toggle video from all server instances stored in the cloud." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all server instances stored in the cloud. </span></div><div aria-label="toggle video from This allows you to compare data in the cloud servers to the baseline image to" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This allows you to compare data in the cloud servers to the baseline image to </span></div><div aria-label="toggle video from make sure there haven't been any unverified changes." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">make sure there haven't been any unverified changes. </span></div><div aria-label="toggle video from An unverified change could come from an intrusion in the cloud network." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An unverified change could come from an intrusion in the cloud network. </span></div><div aria-label="toggle video from current lecture segment: Similar to OS hardening, data and applications on a cloud network are kept" class="rc-Phrase active css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Similar to OS hardening, data and applications on a cloud network are kept </span></div><div aria-label="toggle video from separate depending on their service category." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">separate depending on their service category. </span></div><div aria-label="toggle video from For example, older applications should be kept separate from newer applications," class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">For example, older applications should be kept separate from newer applications, </span></div><div aria-label="toggle video from and software that deals with internal functions should be kept separate" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and software that deals with internal functions should be kept separate </span></div><div aria-label="toggle video from from front-end applications seen by users." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">from front-end applications seen by users. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-even-though-the-clou"><div aria-label="toggle video from Even though the cloud service provider has a shared responsibility with" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Even though the cloud service provider has a shared responsibility with </span></div><div aria-label="toggle video from the organization using their services, there are still security measures that" class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the organization using their services, there are still security measures that </span></div><div aria-label="toggle video from need to be taken by the organization to make sure their cloud network is safe." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">need to be taken by the organization to make sure their cloud network is safe. </span></div><div aria-label="toggle video from Just like traditional networks, operations in the cloud need to be secured." class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Just like traditional networks, operations in the cloud need to be secured. </span></div><div aria-label="toggle video from You're doing great! Meet you in the next video." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You're doing great! Meet you in the next video. </span></div></div>## secure the cloud  


Earlier in this course, you were introduced to [cloud computing<svg aria-labelledby="cds-react-aria-1484-title" class="css-1lzqdox" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/networks-and-network-security/lecture/BGlnq/cloud-networks)

**Cloud computing** is a model for allowing convenient and on-demand network access to a shared pool of configurable computing resources. These resources can be configured and released with minimal management effort or interaction with the service provider.

Just like any other IT infrastructure, a cloud infrastructure needs to be secured. This reading will address some main security considerations that are unique to the cloud and introduce you to the shared responsibility model used for security in the cloud. Many organizations that use cloud resources and infrastructure express concerns about the privacy of their data and resources. This concern is addressed through cryptography and other additional security measures, which will be discussed later in this course.

## Cloud security considerations

Many organizations choose to use cloud services because of the ease of deployment, speed of deployment, cost savings, and scalability of these options. Cloud computing presents unique security challenges that cybersecurity analysts need to be aware of.

### Identity access management

**Identity access management (IAM)** is a collection of processes and technologies that helps organizations manage digital identities in their environment. This service also authorizes how users can use different cloud resources. A common problem that organizations face when using the cloud is the loose configuration of cloud user roles. An improperly configured user role increases risk by allowing unauthorized users to have access to critical cloud operations.

### Configuration

The number of available cloud services adds complexity to the network. Each service must be carefully configured to meet security and compliance requirements. This presents a particular challenge when organizations perform an initial migration into the cloud. When this change occurs on their network, they must ensure that every process moved into the cloud has been configured correctly. If network administrators and architects are not meticulous in correctly configuring the organization’s cloud services, they could leave the network open to compromise. Misconfigured cloud services are a common source of cloud security issues.

### Attack surface 

Cloud service providers (CSPs) offer numerous applications and services for organizations at a low cost.

Every service or application on a network carries its own set of risks and vulnerabilities and increases an organization’s overall attack surface. An increased attack surface must be compensated for with increased security measures.

Cloud networks that utilize many services introduce lots of entry points into an organization’s network. However, if the network is designed correctly, utilizing several services does not introduce more entry points into an organization’s network design. These entry points can be used to introduce malware onto the network and pose other security vulnerabilities. It is important to note that CSPs often defer to more secure options, and have undergone more scrutiny than a traditional on-premises network.

### Zero-day attacks

Zero-day attacks are an important security consideration for organizations using cloud or traditional on-premise network solutions. A **zero day** attack is an exploit that was previously unknown. CSPs are more likely to know about a zero day attack occurring before a traditional IT organization does. CSPs have ways of patching hypervisors and migrating workloads to other virtual machines. These methods ensure the customers are not impacted by the attack. There are also several tools available for patching at the operating system level that organizations can use.

### Visibility and tracking 

Network administrators have access to every data packet crossing the network with both on-premise and cloud networks. They can sniff and inspect data packets to learn about network performance or to check for possible threats and attacks.

This kind of visibility is also offered in the cloud through flow logs and tools, such as packet mirroring. CSPs take responsibility for security in the cloud, but they do not allow the organizations that use their infrastructure to monitor traffic on the CSP’s servers. Many CSPs offer strong security measures to protect their infrastructure. Still, this situation might be a concern for organizations that are accustomed to having full access to their network and operations. CSPs pay for third-party audits to verify how secure a cloud network is and identify potential vulnerabilities. The audits can help organizations identify whether any vulnerabilities originate from on-premise infrastructure and if there are any compliance lapses from their CSP.

### Things change fast in the cloud

CSPs are large organizations that work hard to stay up-to-date with technology advancements. For organizations that are used to being in control of any adjustments made to their network, this can be a potential challenge to keep up with. Cloud service updates can affect security considerations for the organizations using them. For example, connection configurations might need to be changed based on the CSP’s updates.

Organizations that use CSPs usually have to update their IT processes. It is possible for organizations to continue following established best practices for changes, configurations, and other security considerations. However, an organization might have to adopt a different approach in a way that aligns with changes made by the CSP.

Cloud networking offers various options that might appear attractive to a small company—options that they could never afford to build on their own premises. However, it is important to consider that each service adds complexity to the security profile of the organization, and they will need security personnel to monitor all of the cloud services.

## Shared responsibility model

A commonly accepted cloud security principle is the shared responsibility model. The **shared responsibility model** states that the CSP must take responsibility for security involving the cloud infrastructure, including physical data centers, hypervisors, and host operating systems. The company using the cloud service is responsible for the assets and processes that they store or operate in the cloud.

The shared responsibility model ensures that both the CSP and the users agree about where their responsibility for security begins and ends. A problem occurs when organizations assume that the CSP is taking care of security that they have not taken responsibility for. One example of this is cloud applications and configurations. The CSP takes responsibility for securing the cloud, but it is the organization’s responsibility to ensure that services are configured properly according to the security requirements of their organization.

## Key takeaways

It is essential to know the security considerations that are unique to the cloud and understanding the shared responsibility model for cloud security. Organizations are responsible for correctly configuring and maintaining best security practices for their cloud services. The shared responsibility model ensures that both the CSP and users agree about what the organization is responsible for and what the CSP is responsible for when securing the cloud infrastructure.

# how to read a tcpdump

idk if this is correct but from my research this is what I've figured out

##### An example TCP dump looks like this: 

Timestamp source IP &gt; destination IP.protocol : flags \[TCP flags\], seq sequence numbers, ack acknowledgement number, win window size, options \[TCP options\], length payload length : payload

#####   
Here's an actual example:

 12:14:35.783589 IP ip.your.machine.port &gt; domain.com.http: Flags \[P.\], seq 1:74, ack 1, win 512, options \[nop,nop,TS val 3302576859 ecr 3302576859\], length 73: HTTP: GET / HTTP/1.1

##### Here's a breakdown of the example:

12:14:35.783589 IP ip.your.machine.24365 &gt; domain.com.http: Flags \[P.\], seq 1:74, ack 1, win 512, options \[nop,nop,TS val 3302576859 ecr 3302576859\], length 73: HTTP: GET / HTTP/1.1

**12:14:35.783589**: The timestamp of when the packet was captured.

**IP**: The protocol of the packet. In this case, it's IP.

**ip.your.machine**: The source IP address.

**&gt; domain.com.http**: The destination IP address and the protocol (HTTP in this case).

**Flags \[P.\]**: The TCP flags for this packet. "P." stands for PSH (Push) and ACK (Acknowledgment).

**seq 1:74**: The sequence number for this packet. This packet is sending bytes 1 through 74.

**ack 1**: The acknowledgement field. This is the next sequence number that the sender of the ACK is expecting. It's the sequence number plus the segment length received in the last packet.

**win 512**: The window size, indicating the number of bytes that can be received before needing to send an acknowledgment.

**options \[nop,nop,TS val 3302576859 ecr 3302576859\]**: The TCP options for this packet. It includes two No-Operation (nop) options and a Timestamp (TS) option with value (val) 3302576859 and echo reply (ecr) 3302576859.

**length 73**: The length of the payload (in bytes).

**HTTP: GET / HTTP/1.1**: The payload itself, which is an HTTP GET request in this case.

##### TCP Flag codes include:

Flags \[S\] - SYN: Synchronization sequence numbers to initiate a connection

Flags \[F\] - FIN: Finish, used to close a connection

Flags \[P\] - PSH: Push function is utilized

Flags \[R\] - RST: Reset the connection

Flags \[.\] - ACK: Acknowledgment

##### Options Include:  


**nop**: No Operation. It's used for alignment purposes and doesn't carry any information.

**TS val 3302576859**: This is the Timestamp value. It's the value of the sender's timestamp clock when this segment was sent.

**ecr 3302576859**: This is the Echo Reply timestamp. It's the timestamp value that was received in the TSval field of the segment being acknowledged.

# network hardening

# Course wrap-up; Glossary Cybersecurity  Course 3

<div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk-wow%2C-we-have-covered"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item"><div class="phrases"><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Wow, we have covered a lot in this course! </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Let's review everything we've discussed. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">You learned about networks, network architecture, and the best practices used </span><span class="cds-2647 css-80vnnb cds-2649">by security professionals to secure a network against security breaches. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">As we bring this course to a close, </span><span class="cds-2647 css-80vnnb cds-2649">let's review what you've learned about security networks so far. </span></div></div></div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk-"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item">  
</div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk-first%2C-we-explored-t"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item"><div class="phrases"><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">First, we explored the structure of a network. </span></div><div class="rc-Phrase active css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">A security analyst must understand how a network is designed to be able to </span><span class="cds-2647 css-80vnnb cds-2649">identify parts of a network that present vulnerabilities and need to be secured. </span></div></div></div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk--1"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item">  
</div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk-next%2C-we-learned-abo"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item"><div class="phrases"><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Next, we learned about network operations and </span><span class="cds-2647 css-80vnnb cds-2649">how they affect the communication of data. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Network protocols determine how the data is transmitted over the network. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">As communication takes place over the network, malicious actors may use tactics </span><span class="cds-2647 css-80vnnb cds-2649">such as denial of service attacks, packet sniffing, and IP spoofing. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Security analysts employ tools and </span><span class="cds-2647 css-80vnnb cds-2649">measures such as firewall rules to protect against these attacks. </span></div></div></div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk--2"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item">  
</div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk-we-also-discussed-se"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item"><div class="phrases"><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">We also discussed security hardening. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Security hardening is used to reduce the attack area of a network. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">This means the attack does not disable an entire network. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Security hardening can be done at the hardware level, the software level, or </span><span class="cds-2647 css-80vnnb cds-2649">the network level. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Securing networks is an essential part of a security analyst's duties. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Knowledge of a network and its operations and security practices will ensure that </span><span class="cds-2647 css-80vnnb cds-2649">you are successful in your career as a security analyst. </span></div></div></div></div><div class="cds-2511 css-xl5mb3 cds-2512" id="bkmrk--3"><div class="cds-2511 rc-Paragraph css-1lz62pp cds-2513 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-and-that-brings-us-t"><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">And that brings us to the topic of our next course, </span><span class="cds-2647 css-80vnnb cds-2649">which will cover computing basics for security analysts. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">In that course, you'll learn how to use the Linux command line to authenticate and </span><span class="cds-2647 css-80vnnb cds-2649">authorize users on the network, and to use SQL, </span><span class="cds-2647 css-80vnnb cds-2649">otherwise known as SQL, to communicate with databases. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Great work getting here! </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">All of the concepts you've learned in this section will be essential for </span><span class="cds-2647 css-80vnnb cds-2649">success in your role as security analyst. </span></div><div class="rc-Phrase css-ugczj4" tabindex="0"><span class="cds-2647 css-80vnnb cds-2649">Now you can move on to the next course. Enjoy! </span></div></div><div class="rc-Phrase css-ugczj4" id="bkmrk--4" tabindex="0"></div>#### Glossary: Terms and definitions from Course 3

#### A

  
Active packet sniffing: A type of attack where data packets are manipulated in transit  
Address Resolution Protocol (ARP): Used to determine the MAC address of the next  
router or device to traverse

####   
B

  
Bandwidth: The maximum data transmission capacity over a network, measured by  
bits per second  
Baseline configuration: A documented set of specifications within a system that is  
used as a basis for future builds, releases, and updates  
Bluetooth: Used for wireless communication with nearby physical devices  
Botnet: A collection of computers infected by malware that are under the control of a  
single threat actor, known as the “bot herder"

####   
C

  
Cloud-based firewalls: Software firewalls that are hosted by the cloud service  
provider  
Cloud computing: The practice of using remote servers, application, and network  
services that are hosted on the internet instead of on local physical devices

Cloud network: A collection of servers or computers that stores resources and data in  
remote data centers that can be accessed via the internet  
Controlled zone: A subnet that protects the internal network from the uncontrolled  
zone

####   
D

  
Data packet: A basic unit of information that travels from one device to another within  
a network  
Denial of service (DoS) attack: An attack that targets a network or server and floods  
it with network traffic  
Distributed denial of service (DDoS) attack: A type of denial or service attack that  
uses multiple devices or servers located in different locations to flood the target  
network with unwanted traffic  
Domain Name System (DNS): A networking protocol that translates internet domain  
names into IP addresses

####   
E

  
Encapsulation: A process performed by a VPN service that protects your data by  
wrapping sensitive data in other data packets

####   
F

  
File Transfer Protocol (FTP): Used to transfer files from one device to another over a  
network  
Firewall: A network security device that monitors traffic to or from your network  
Forward proxy server: A server that regulates and restricts a person’s access to the  
internet

####   
H

  
Hardware: The physical components of a computer

Hub: A network device that broadcasts information to every device on the network  
Hypertext Transfer Protocol (HTTP): An application layer protocol that provides a  
method of communication between clients and website servers  
Hypertext Transfer Protocol Secure (HTTPS): A network protocol that provides a  
secure method of communication between clients and servers

####   
I

  
Identity and access management (IAM): A collection of processes and technologies  
that helps organizations manage digital identities in their environment  
IEEE 802.11 (Wi-Fi): A set of standards that define communication for wireless LANs  
Internet Control Message Protocol (ICMP): An internet protocol used by devices to  
tell each other about data transmission errors across the network  
Internet Control Message Protocol (ICMP) flood: A type of DoS attack performed by  
an attacker repeatedly sending ICMP request packets to a network server  
Internet Protocol (IP): A set of standards used for routing and addressing data  
packets as they travel between devices on a network  
Internet Protocol (IP) address: A unique string of characters that identifies the  
location of a device on the internet  
IP spoofing: A network attack performed when an attacker changes the source IP of a  
data packet to impersonate an authorized system and gain access to a network

####   
L

  
Local area network (LAN): A network that spans small areas like an office building, a  
school, or a home

####   
M

  
Media Access Control (MAC) address: A unique alphanumeric identifier that is  
assigned to each physical device on a network

Modem: A device that connects your router to the internet and brings internet access  
to the LAN  
Multi-factor authentication (MFA): A security measure that requires a user to verify  
their identity in two or more ways to access a system or network

####   
N

  
Network: A group of connected devices  
Network log analysis: The process of examining network logs to identify events of  
interest  
Network protocols: A set of rules used by two or more devices on a network to  
describe the order of delivery of data and the structure of data  
Network segmentation: A security technique that divides the network into segments

####   
O

  
Operating system (OS): The interface between computer hardware and the user  
Open systems interconnection (OSI) model: A standardized concept that describes  
the seven layers computers use to communicate and send data over the network  
On-path attack: An attack where a malicious actor places themselves in the middle of  
an authorized connection and intercepts or alters the data in transit

####   
P

  
Packet sniffing: The practice of capturing and inspecting data packets across a  
network  
Passive packet sniffing: A type of attack where a malicious actor connects to a  
network hub and looks at all traffic on the network  
Patch update: A software and operating system update that addresses security  
vulnerabilities within a program or product

Penetration testing: A simulated attack that helps identify vulnerabilities in systems,  
networks, websites, applications, and processes  
Ping of death: A type of DoS attack caused when a hacker pings a system by sending  
it an oversized ICMP packet that is bigger than 64KB  
Port: A software-based location that organizes the sending and receiving of data  
between devices on a network  
Port filtering: A firewall function that blocks or allows certain port numbers to limit  
unwanted communication  
Proxy server: A server that fulfills the requests of its clients by forwarding them to  
other servers

####   
R

  
Replay attack: A network attack performed when a malicious actor intercepts a data  
packet in transit and delays it or repeats it at another time  
Reverse proxy server: A server that regulates and restricts the Internet's access to an  
internal server  
Router: A network device that connects multiple networks together

####   
S

  
Secure File Transfer Protocol (SFTP): A secure protocol used to transfer files from  
one device to another over a network  
Secure shell (SSH): A security protocol used to create a shell with a remote system  
Security hardening: The process of strengthening a system to reduce its  
vulnerabilities and attack surface  
Security information and event management (SIEM): An application that collects  
and analyzes log data to monitors critical activities for an organization  
Security zone: A segment of a company’s network that protects the internal network  
from the internet

Simple Network Management Protocol (SNMP): A network protocol used for  
monitoring and managing devices on a network  
Smurf attack: A network attack performed when an attacker sniffs an authorized  
user’s IP address and floods it with ICMP packets  
Speed: The rate at which a device sends and receives data, measured by bits per  
second  
Stateful: A class of firewall that keeps track of information passing through it and  
proactively filters out threats  
Stateless: A class of firewall that operates based on predefined rules and that does  
not keep track of information from data packets  
Subnetting: The subdivision of a network into logical groups called subnets  
Switch: A device that makes connections between specific devices on a network by  
sending and receiving data between them  
Synchronize (SYN) flood attack: A type of DoS attack that simulates a TCP/IP  
connection and floods a server with SYN packets

#####   
T

  
TCP/IP model: A framework used to visualize how data is organized and transmitted  
across a network  
Transmission Control Protocol (TCP): An internet communication protocol that  
allows two devices to form a connection and stream data  
Transmission control protocol (TCP) 3-way handshake: A three-step process used  
to establish an authenticated connection between two devices on a network

#####   
U

  
Uncontrolled zone: The portion of the network outside the organization  
User Datagram Protocol (UDP): A connectionless protocol that does not establish a  
connection between devices before transmissions

##### V

  
Virtual Private Network (VPN): A network security service that changes your public  
IP address and masks your virtual location so that you can keep your data private when  
you are using a public network like the internet

#####   
W

  
Wide Area Network (WAN): A network that spans a large geographic area like a city,  
state, or country  
Wi-Fi Protected Access (WPA): A wireless security protocol for devices to connect to  
the internet